SlideShare a Scribd company logo
1 of 26
Transportation & Cargo Security
Chapter Three: Protection of
Transportation Facilities
Learning Objectives
After reading this chapter the reader should be able to:
1. Comprehend and utilize standard risk management security techniques.
2. Compare and contrast the ability to harden an airport terminal versus a rail or cruise ship terminal.
3. Analyze the difficulties related to installing metal detectors and scanning equipment in a mass
transit environment.
4. Explore the means to track hazardous cargo through the trucking industry.
5. Assess the federal government’s highway safety and security program.
6. Discuss the “best industry practices” in place in the trucking, mass transit, and oil pipeline
industries and debate the need for federal mandated rules.
7. Describe the unique aspects of protecting the pipeline industry.
8. Conduct a risk management assessment on a transportation facility.
Subtopics
Introduction
The U.S. Transportation Security Administration (TSA)
assumed responsibility for overall transportation security
after 9/11. They initially hired approximately 65,000
employees in a relatively short period of time and promised
to hire more competent screeners, use explosive detection
devices (EDS); and increase the percentages of screened
baggage. Long standing vulnerabilities had been recognized
but not sufficiently addressed prior to 9/ll including failure
by screeners to detect threats when screening passengers,
absence of a requirement to examine checked baggage on
domestic flights, inadequate controls in limiting access to
secure areas, and failure to control access to air traffic
control systems (ATC). These problems persist.
Update:
• An investigation by the General Accountability Office
shows a gaping vulnerability remains. Between
January 2006 and October 2006 teams of undercover
federal investigators walked through various airport
checkpoints carrying common household items in
their bags. By themselves the materials were not
bombs. But they were ingredients that could have
been mixed together in an airplane restroom to make
an improvised explosive device (IED) .
• The failure was across the board. 21 airports were
tested and in all 21, screeners were unable to find
component parts that could be used to make
homemade bombs.
TSA FAIL: Screeners Frequently Miss
Fake Bombs During Undercover Tests!
Solutions
The process of risk assessment begins with three well accepted principles: predictability, probability,
and criticality. Security professionals agree that the process from risk analysis to risk management
involve several distinct steps. They generally include:
1. Define the existing problem
2. Spell out the objectives of the assessment
3. Evaluate the current measures in place
4. Identify and appraise the potential risk
5. Select the appropriate risk reduction measures appropriate to the circumstances
6. Develop and implement the selected measures
7. Test the measures
8. Update the program at least annually.
Protecting Public Air Transportation
Airports are public facilities offering a public service, and are
extremely difficult to harden, as targets due to the need for
accessibility. Consequently, public air transportation is an
alluring target in terms of difficulty in providing adequate
physical, personnel, and operational security. A report issued
by the GAO in June 2000 stated that screeners failed to detect
threat objects located on passengers and carry-on baggage;
failing to notice about 20% of the objects, which would have
posed a threat. The statistics actually showed a decline in the
detection rate between the years 1991and 1999, something not
lost on terrorist strategic planners. Access control also presents
unique problems for airport officials and special measures must
be taken because of the uniqueness of the airport venue.
Update:
A May 2005 GAO report says many of the nation's 45,000
screeners are not getting congressionally mandated
training because of staffing shortages and because many
work sites don't have access to high-speed Internet
training courses. "As of October 2004, nearly half of the
screener workforce did not have high-speed access to the
Online Learning Center at their training facility," according
to the report. The GAO said the TSA has taken steps to
improve screener performance, and to better measure
performance, but said more needs to be done, particularly
in the area of checked baggage. The TSA has made a
request for $174 million in the fiscal 2006 budget for high-
speed Internet connectivity.
TSA FAIL Missed Loaded Gun in Carry-
On Bag . . . Passenger Boards Plane!
Protecting Rail Service
Train robbery, a quintessentially 19th century crime, is alive and
well today. Railroad police use computers to pinpoint where
cargo disappeared and infrared scopes to scan rail yards. Theft
and pilferage have been estimated at $9 million to $14 million a
year. The Association of American Railroads has indicated the
actual loss during 2002 to be $11.4 million. This, of course,
represents only a fraction of the industry’s 2002 revenue of
$42.9 billion. The heart of the rail security system is the Railway
Alert Network (RAN), the major purpose of which is to monitor
the level of threat to the rail industry and to alert the industry
if it changes. In March 2004, the DHS announced a plan to the
begin testing a way to screen rail passengers and their luggage
to see if it can quickly and accurately detect security risks.
Protecting Rail Service continued
The stated purpose of the project would be to test
new technologies and screening concepts to see if
they could be applied to trains, which depend on
passengers being able to get on and off cars
quickly. So far it has been the position of the TSA
that putting a new security system in place at
railroad facilities is inappropriate. A TSA official
was quoted as saying, “We can implement a
system of security that is very, very
comprehensive….. but it would cost billions of
dollars. Is that the right strategy? Our judgment at
this point is that it is not.”
Keeping the Rail Lines Safe
Protecting Maritime Facilities
Maritime security presents some of the most
unique challenges of the transportation industry.
The challenge is even greater due to a complex
network of ownership, domestic, and foreign
interests, and varying levels of security at different
ports and terminals. Cruise ships have similar
unique challenges but do inspect all carry-on
baggage and use metal detectors to examine
passengers. The industry must now comply with
U.S. Coast Guard rules and the corresponding
regulations of the International Maritime
Organization.
Protecting Maritime Facilities
Most U.S. ports are landlord ports. The port owns
the property, builds the facilities, and performs
most maintenance functions. The facilities are
leased to terminal operators. These people engage
in the actual business of moving cargo. Ports are
generally patrolled by local police officers but all
tenants must provide individual security. Access to
ports is generally provided along truck ways or
causeways where incoming cargo is searched upon
entering the facility. Unless proper equipment is
utilized to conduct these searches, the exercise
can become an exercise in futility.
Protecting Maritime Facilities
The U.S. Coast Guard has established port
security zones in all U.S. ports. They screen,
though not all physically, all arriving
commercial vessels. Port security measures are
imposed on an 'as needed' basis. The U.S. Coast
Guard has also established protection zones for
a distance of 500 yards around all U.S. naval
vessels in navigable waters of the United
States.
Port of Long Beach Security
Protecting Mass Transit
The evolution of urban public transportation systems from
horse-drawn street cars to automobiles, buses, and complex
subway and elevated train systems has transformed the
industry and its associated security requirements. In an
attack against a mass transit system, local law enforcement
would take the lead in preparing for, preventing, and
responding. Most American cities give responsibility for
mass transit security to municipal law enforcement agencies,
although some larger municipalities support designated
forces. The Department of Homeland Security announced in
November 2003 that it allocated $750 million for the Urban
Area Security Initiative (UASI). The program provides monies
to urban areas to enhance overall security and preparedness
levels in order to prevent, respond, and recover from acts of
terrorism.
Protecting Mass Transit
As part of a commitment to directing funds to urban areas, which
have been designated as critical national infrastructures, DHS has
selected several urban areas to receive the largest portion of funds:
up to $675 million. The DHS based the decision on a formula that
took into account factors including critical infrastructure, population
density, and credible threat intelligence. In December 2002, the
Government Accounting Office issued a report outlining the
vulnerability of buses and commuter rail systems. The report
conducted in-depth reviews of ten transit agencies and concludes
that while commuter transit systems could be targets of terrorist
attacks, insufficient funding, coordination and sharing of critical
information are inhibiting efforts to make the systems more secure.
Approximately 14 million Americans use mass transit every workday.
The key to a better response against a mass transit attack is better
technology and better training.
TRANSPORTATION IN 2 learns about the newly
created transit counter terrorism team
Protecting Highways/Trucking
The purpose of the Highway Watch Program is to promote security
awareness among all segments of the motor carrier transportation
community. This program trains commercial drivers to observe and report
any suspicious activities or items that may threaten the highway
transportation system. Authority for the program was originally contained
in the fiscal year 2003 Appropriations Act under Public Law 108-7 and
included an amount of $19,700,000. On an average day, more than 7.5
million vehicles and approximately 10.5 million holders of commercial
driver’s licenses (CDL’s) are on U.S. roads. Almost 2.5 million of the drivers
have an endorsement, which permits them to haul hazardous cargo.
According to U.S. Customs, more than 11.2 million trucks entered the United
States in 2001. The job of protecting them and their cargo is incredible and
hard to grasp. Of particular significance in evaluating the safety and security
of the trucking industry, is of course, the huge numbers of people involved.
Those people who typically come into contact with vehicles include drivers,
mechanics, washers, loading and unloading personnel, and commercial
vehicle inspectors. In order for any semblance of security to prevail, these
positions must be filled with qualified employees who are provided with
appropriate supervision.
TSA Checkpoints Now On Interstate
Highways
Protecting Pipelines
There are approximately 200,000 miles of oil pipeline alone in the
United States. The industry has taken steps to increase close
surveillance of pipelines, implement even more restrictions to
access vital points along routes, and to expand the physical
patrolling of the lines. Presidential Decision Directive 63 assigned
lead responsibility for pipeline infrastructure protection to the
Department of Transportation. Immediately after 9/11 the Office
of Pipeline Safety issued emergency bulletins to oil and gas
companies and also removed from its website detailed diagrams
representing the locations of the nation’s pipelines. The OPS also
conducted a detailed vulnerability assessment of exactly which
pipeline facilities were absolutely critical to the economic and
defense capabilities of the nation. The industry soon came to
focus on critical pipeline facilities, control centers, pump and
compressor stations, and storage facilities.
Oil and gas security solutions from
Siemens
Conclusion
The world faces a two-branched challenge both to
maintain the security of transportation systems and
continue to ensure the free flow of commerce. The
Department of Homeland Security consolidated 22
different agencies in an attempt to orchestrate a
network of standardized security for each
transportation component. However, now several years
since the tragedy on 9/11, the bureaucracy has yet to
really accomplish all but the beginnings of a security
program based on time tested protocols of risk
management. The efforts are often under-funded,
overlapping, insufficient and redundant, and have only
recently expanded outside the air component.
Case Study:
If you were asked to be a contributing
consultant on the planning and
development of a new port in New
Orleans, what policies, processes, and
procedures would you recommend to
adequately protect the maritime industry
using this facility; i.e., rail access, truck
access, pipeline access and possibly mass
transit to a cruise ship terminal?
Discussion Questions and Exercises

More Related Content

What's hot

General Aviation Security
General Aviation SecurityGeneral Aviation Security
General Aviation SecurityERAUWebinars
 
International Civil Aviation Security
International Civil Aviation Security International Civil Aviation Security
International Civil Aviation Security OECD Governance
 
Aviation security -_chpt1
Aviation security -_chpt1Aviation security -_chpt1
Aviation security -_chpt1carlinclarke
 
Aci policies and_recommended_practices_security_at_airports_edition_7(1)
Aci policies and_recommended_practices_security_at_airports_edition_7(1)Aci policies and_recommended_practices_security_at_airports_edition_7(1)
Aci policies and_recommended_practices_security_at_airports_edition_7(1)mohamed elhefnawy
 
New airport passenger screening technologies tate
New airport passenger screening technologies tateNew airport passenger screening technologies tate
New airport passenger screening technologies tateLeishman Associates
 
SecurityPolicyMemorandum
SecurityPolicyMemorandumSecurityPolicyMemorandum
SecurityPolicyMemorandumsophia malave
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONPaul Mears Phd.
 
ASJ_XV No 2 (2016)_Julianne Oh
ASJ_XV No 2 (2016)_Julianne OhASJ_XV No 2 (2016)_Julianne Oh
ASJ_XV No 2 (2016)_Julianne OhJulianne Oh
 
Chpt 5 commercial airport avsec
Chpt 5 commercial airport avsecChpt 5 commercial airport avsec
Chpt 5 commercial airport avseccarlinclarke
 
SECCON - Seamless Integrated Security Planning
SECCON - Seamless Integrated Security PlanningSECCON - Seamless Integrated Security Planning
SECCON - Seamless Integrated Security PlanningMesseIntl
 
AirportSecurityPlan
AirportSecurityPlanAirportSecurityPlan
AirportSecurityPlanAiDY
 
Information managment System for Disasters.
Information managment System for Disasters.Information managment System for Disasters.
Information managment System for Disasters.pdsolanki
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutionsTristan Wiggill
 
A Look at the Emerging Security Threats to the Aviation Industry
A Look at the Emerging Security Threats to the Aviation IndustryA Look at the Emerging Security Threats to the Aviation Industry
A Look at the Emerging Security Threats to the Aviation IndustryDominic_White
 
The Route to One Million Passengers: Increasing Security Efforts in Suriname
The Route to One Million Passengers: Increasing Security Efforts in SurinameThe Route to One Million Passengers: Increasing Security Efforts in Suriname
The Route to One Million Passengers: Increasing Security Efforts in SurinameShalini Levens
 
ecommerce for virgin airline
ecommerce for virgin airlineecommerce for virgin airline
ecommerce for virgin airlineNill Evanness
 

What's hot (20)

General Aviation Security
General Aviation SecurityGeneral Aviation Security
General Aviation Security
 
International Civil Aviation Security
International Civil Aviation Security International Civil Aviation Security
International Civil Aviation Security
 
Aviation security -_chpt1
Aviation security -_chpt1Aviation security -_chpt1
Aviation security -_chpt1
 
Avsec policy
Avsec policyAvsec policy
Avsec policy
 
Aci policies and_recommended_practices_security_at_airports_edition_7(1)
Aci policies and_recommended_practices_security_at_airports_edition_7(1)Aci policies and_recommended_practices_security_at_airports_edition_7(1)
Aci policies and_recommended_practices_security_at_airports_edition_7(1)
 
New airport passenger screening technologies tate
New airport passenger screening technologies tateNew airport passenger screening technologies tate
New airport passenger screening technologies tate
 
SecurityPolicyMemorandum
SecurityPolicyMemorandumSecurityPolicyMemorandum
SecurityPolicyMemorandum
 
AVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATIONAVIATION SECURITY PRESENTATION
AVIATION SECURITY PRESENTATION
 
ASJ_XV No 2 (2016)_Julianne Oh
ASJ_XV No 2 (2016)_Julianne OhASJ_XV No 2 (2016)_Julianne Oh
ASJ_XV No 2 (2016)_Julianne Oh
 
Chpt 5 commercial airport avsec
Chpt 5 commercial airport avsecChpt 5 commercial airport avsec
Chpt 5 commercial airport avsec
 
SECCON - Seamless Integrated Security Planning
SECCON - Seamless Integrated Security PlanningSECCON - Seamless Integrated Security Planning
SECCON - Seamless Integrated Security Planning
 
AirportSecurityPlan
AirportSecurityPlanAirportSecurityPlan
AirportSecurityPlan
 
Information managment System for Disasters.
Information managment System for Disasters.Information managment System for Disasters.
Information managment System for Disasters.
 
Aviation security challenges: practical solutions
Aviation security challenges: practical solutionsAviation security challenges: practical solutions
Aviation security challenges: practical solutions
 
A Look at the Emerging Security Threats to the Aviation Industry
A Look at the Emerging Security Threats to the Aviation IndustryA Look at the Emerging Security Threats to the Aviation Industry
A Look at the Emerging Security Threats to the Aviation Industry
 
The Route to One Million Passengers: Increasing Security Efforts in Suriname
The Route to One Million Passengers: Increasing Security Efforts in SurinameThe Route to One Million Passengers: Increasing Security Efforts in Suriname
The Route to One Million Passengers: Increasing Security Efforts in Suriname
 
Safety & Security Airports comparison
Safety & Security Airports comparisonSafety & Security Airports comparison
Safety & Security Airports comparison
 
The Impact of Covid-19 on Aviation
The Impact of Covid-19 on AviationThe Impact of Covid-19 on Aviation
The Impact of Covid-19 on Aviation
 
The Pandemic Effects on the World’s Airports and the Likely Passenger Experi...
 The Pandemic Effects on the World’s Airports and the Likely Passenger Experi... The Pandemic Effects on the World’s Airports and the Likely Passenger Experi...
The Pandemic Effects on the World’s Airports and the Likely Passenger Experi...
 
ecommerce for virgin airline
ecommerce for virgin airlineecommerce for virgin airline
ecommerce for virgin airline
 

Viewers also liked

Viewers also liked (13)

403 10
403 10403 10
403 10
 
403 14
403 14403 14
403 14
 
403 13
403 13403 13
403 13
 
Chapter 2 part 2 major historical development
Chapter 2 part 2 major historical developmentChapter 2 part 2 major historical development
Chapter 2 part 2 major historical development
 
Tsa's positive 1
Tsa's positive 1Tsa's positive 1
Tsa's positive 1
 
Chapter 10 oversight and accountability 1
Chapter 10  oversight and accountability 1Chapter 10  oversight and accountability 1
Chapter 10 oversight and accountability 1
 
403 12
403 12403 12
403 12
 
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
 
Chapter 3 the us intelligence community
Chapter 3 the us intelligence communityChapter 3 the us intelligence community
Chapter 3 the us intelligence community
 
Chapter 8 covert action
Chapter 8 covert actionChapter 8 covert action
Chapter 8 covert action
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Intelligence agencys
Intelligence agencysIntelligence agencys
Intelligence agencys
 

Similar to 403 3

1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s NamMerrileeDelvalle969
 
Chapter 10Air CargoThis chapter examines issu
 Chapter 10Air CargoThis chapter examines issu Chapter 10Air CargoThis chapter examines issu
Chapter 10Air CargoThis chapter examines issuMargaritoWhitt221
 
Port Security_Anderson_Richard
Port Security_Anderson_RichardPort Security_Anderson_Richard
Port Security_Anderson_RichardRichard Anderson
 
Thinking Highways
Thinking HighwaysThinking Highways
Thinking HighwaysFalascoj
 
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING LinaCovington707
 
Respond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime TransportatRespond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime Transportatmickietanger
 
Class,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differenClass,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differenVinaOconner450
 
Feature report "Rail risk - Stay on Track" | Aon NL
Feature report "Rail risk - Stay on Track" | Aon NLFeature report "Rail risk - Stay on Track" | Aon NL
Feature report "Rail risk - Stay on Track" | Aon NLAon Nederland
 
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docxMARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docxalfredacavx97
 
MWL2016_Brochure_web
MWL2016_Brochure_webMWL2016_Brochure_web
MWL2016_Brochure_webBrady Marcus
 
White Paper on Transport Safety in the Era of Digital Mobility
White Paper on Transport Safety in the Era of Digital MobilityWhite Paper on Transport Safety in the Era of Digital Mobility
White Paper on Transport Safety in the Era of Digital MobilityCarl Jackson
 
Please respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docxPlease respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docxleahlegrand
 
O - Transportation Event Data Recorders
O - Transportation Event Data RecordersO - Transportation Event Data Recorders
O - Transportation Event Data RecordersRobert McElroy
 
AT Level I Training Application Trains 5 Million
AT Level I Training Application Trains 5 MillionAT Level I Training Application Trains 5 Million
AT Level I Training Application Trains 5 MillionJohn Jaques
 
Speaker 5 Capt D N Goswami
Speaker 5 Capt D N GoswamiSpeaker 5 Capt D N Goswami
Speaker 5 Capt D N Goswamicmmindia2017
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkETDAofficialRegist
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber StrategyIan Kelly
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilRussell Publishing
 

Similar to 403 3 (20)

1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam1Transportation Security ProposalStudent’s Nam
1Transportation Security ProposalStudent’s Nam
 
Chapter 10Air CargoThis chapter examines issu
 Chapter 10Air CargoThis chapter examines issu Chapter 10Air CargoThis chapter examines issu
Chapter 10Air CargoThis chapter examines issu
 
Port Security_Anderson_Richard
Port Security_Anderson_RichardPort Security_Anderson_Richard
Port Security_Anderson_Richard
 
Thinking Highways
Thinking HighwaysThinking Highways
Thinking Highways
 
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
DEPARTMENT OF HOMELAND SECURITY PROGRESS IN IMPLEMENTING
 
Respond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime TransportatRespond with 250 wordsThe enactment of the Maritime Transportat
Respond with 250 wordsThe enactment of the Maritime Transportat
 
Class,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differenClass,During this week’s lesson, we learned about two differen
Class,During this week’s lesson, we learned about two differen
 
Feature report "Rail risk - Stay on Track" | Aon NL
Feature report "Rail risk - Stay on Track" | Aon NLFeature report "Rail risk - Stay on Track" | Aon NL
Feature report "Rail risk - Stay on Track" | Aon NL
 
Air cargo security and e commerce delivery
Air cargo security and e commerce deliveryAir cargo security and e commerce delivery
Air cargo security and e commerce delivery
 
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docxMARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
 
MWL2016_Brochure_web
MWL2016_Brochure_webMWL2016_Brochure_web
MWL2016_Brochure_web
 
White Paper on Transport Safety in the Era of Digital Mobility
White Paper on Transport Safety in the Era of Digital MobilityWhite Paper on Transport Safety in the Era of Digital Mobility
White Paper on Transport Safety in the Era of Digital Mobility
 
Please respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docxPlease respond to both students separately with a minimum of 150.docx
Please respond to both students separately with a minimum of 150.docx
 
O - Transportation Event Data Recorders
O - Transportation Event Data RecordersO - Transportation Event Data Recorders
O - Transportation Event Data Recorders
 
AT Level I Training Application Trains 5 Million
AT Level I Training Application Trains 5 MillionAT Level I Training Application Trains 5 Million
AT Level I Training Application Trains 5 Million
 
Speaker 5 Capt D N Goswami
Speaker 5 Capt D N GoswamiSpeaker 5 Capt D N Goswami
Speaker 5 Capt D N Goswami
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
 
Academy
Academy Academy
Academy
 

Recently uploaded

Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Delhi Call girls
 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxScottMeyers35
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32JSchaus & Associates
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisChristina Parmionova
 
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...Christina Parmionova
 
Make a difference in a girl's life by donating to her education!
Make a difference in a girl's life by donating to her education!Make a difference in a girl's life by donating to her education!
Make a difference in a girl's life by donating to her education!SERUDS INDIA
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCNAP Global Network
 
NGO working for orphan children’s education
NGO working for orphan children’s educationNGO working for orphan children’s education
NGO working for orphan children’s educationSERUDS INDIA
 
3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.Christina Parmionova
 
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...HyderabadDolls
 
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptxNAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptxNAP Global Network
 
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetkumargunjan9515
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCNAP Global Network
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...Namrata Singh
 
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfHonasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfSocial Samosa
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 

Recently uploaded (20)

Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptx
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
 
tOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTRtOld settlement register shouldnotaffect BTR
tOld settlement register shouldnotaffect BTR
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
 
Make a difference in a girl's life by donating to her education!
Make a difference in a girl's life by donating to her education!Make a difference in a girl's life by donating to her education!
Make a difference in a girl's life by donating to her education!
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
NGO working for orphan children’s education
NGO working for orphan children’s educationNGO working for orphan children’s education
NGO working for orphan children’s education
 
3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.
 
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...Just Call VIP Call Girls In  Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
Just Call VIP Call Girls In Bangalore Kr Puram ☎️ 6378878445 Independent Fem...
 
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptxNAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptx
 
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
 
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfHonasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdf
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 

403 3

  • 1. Transportation & Cargo Security Chapter Three: Protection of Transportation Facilities
  • 2. Learning Objectives After reading this chapter the reader should be able to: 1. Comprehend and utilize standard risk management security techniques. 2. Compare and contrast the ability to harden an airport terminal versus a rail or cruise ship terminal. 3. Analyze the difficulties related to installing metal detectors and scanning equipment in a mass transit environment. 4. Explore the means to track hazardous cargo through the trucking industry. 5. Assess the federal government’s highway safety and security program. 6. Discuss the “best industry practices” in place in the trucking, mass transit, and oil pipeline industries and debate the need for federal mandated rules. 7. Describe the unique aspects of protecting the pipeline industry. 8. Conduct a risk management assessment on a transportation facility.
  • 3. Subtopics Introduction The U.S. Transportation Security Administration (TSA) assumed responsibility for overall transportation security after 9/11. They initially hired approximately 65,000 employees in a relatively short period of time and promised to hire more competent screeners, use explosive detection devices (EDS); and increase the percentages of screened baggage. Long standing vulnerabilities had been recognized but not sufficiently addressed prior to 9/ll including failure by screeners to detect threats when screening passengers, absence of a requirement to examine checked baggage on domestic flights, inadequate controls in limiting access to secure areas, and failure to control access to air traffic control systems (ATC). These problems persist.
  • 4. Update: • An investigation by the General Accountability Office shows a gaping vulnerability remains. Between January 2006 and October 2006 teams of undercover federal investigators walked through various airport checkpoints carrying common household items in their bags. By themselves the materials were not bombs. But they were ingredients that could have been mixed together in an airplane restroom to make an improvised explosive device (IED) . • The failure was across the board. 21 airports were tested and in all 21, screeners were unable to find component parts that could be used to make homemade bombs.
  • 5. TSA FAIL: Screeners Frequently Miss Fake Bombs During Undercover Tests!
  • 6. Solutions The process of risk assessment begins with three well accepted principles: predictability, probability, and criticality. Security professionals agree that the process from risk analysis to risk management involve several distinct steps. They generally include: 1. Define the existing problem 2. Spell out the objectives of the assessment 3. Evaluate the current measures in place 4. Identify and appraise the potential risk 5. Select the appropriate risk reduction measures appropriate to the circumstances 6. Develop and implement the selected measures 7. Test the measures 8. Update the program at least annually.
  • 7. Protecting Public Air Transportation Airports are public facilities offering a public service, and are extremely difficult to harden, as targets due to the need for accessibility. Consequently, public air transportation is an alluring target in terms of difficulty in providing adequate physical, personnel, and operational security. A report issued by the GAO in June 2000 stated that screeners failed to detect threat objects located on passengers and carry-on baggage; failing to notice about 20% of the objects, which would have posed a threat. The statistics actually showed a decline in the detection rate between the years 1991and 1999, something not lost on terrorist strategic planners. Access control also presents unique problems for airport officials and special measures must be taken because of the uniqueness of the airport venue.
  • 8. Update: A May 2005 GAO report says many of the nation's 45,000 screeners are not getting congressionally mandated training because of staffing shortages and because many work sites don't have access to high-speed Internet training courses. "As of October 2004, nearly half of the screener workforce did not have high-speed access to the Online Learning Center at their training facility," according to the report. The GAO said the TSA has taken steps to improve screener performance, and to better measure performance, but said more needs to be done, particularly in the area of checked baggage. The TSA has made a request for $174 million in the fiscal 2006 budget for high- speed Internet connectivity.
  • 9. TSA FAIL Missed Loaded Gun in Carry- On Bag . . . Passenger Boards Plane!
  • 10. Protecting Rail Service Train robbery, a quintessentially 19th century crime, is alive and well today. Railroad police use computers to pinpoint where cargo disappeared and infrared scopes to scan rail yards. Theft and pilferage have been estimated at $9 million to $14 million a year. The Association of American Railroads has indicated the actual loss during 2002 to be $11.4 million. This, of course, represents only a fraction of the industry’s 2002 revenue of $42.9 billion. The heart of the rail security system is the Railway Alert Network (RAN), the major purpose of which is to monitor the level of threat to the rail industry and to alert the industry if it changes. In March 2004, the DHS announced a plan to the begin testing a way to screen rail passengers and their luggage to see if it can quickly and accurately detect security risks.
  • 11. Protecting Rail Service continued The stated purpose of the project would be to test new technologies and screening concepts to see if they could be applied to trains, which depend on passengers being able to get on and off cars quickly. So far it has been the position of the TSA that putting a new security system in place at railroad facilities is inappropriate. A TSA official was quoted as saying, “We can implement a system of security that is very, very comprehensive….. but it would cost billions of dollars. Is that the right strategy? Our judgment at this point is that it is not.”
  • 12. Keeping the Rail Lines Safe
  • 13. Protecting Maritime Facilities Maritime security presents some of the most unique challenges of the transportation industry. The challenge is even greater due to a complex network of ownership, domestic, and foreign interests, and varying levels of security at different ports and terminals. Cruise ships have similar unique challenges but do inspect all carry-on baggage and use metal detectors to examine passengers. The industry must now comply with U.S. Coast Guard rules and the corresponding regulations of the International Maritime Organization.
  • 14. Protecting Maritime Facilities Most U.S. ports are landlord ports. The port owns the property, builds the facilities, and performs most maintenance functions. The facilities are leased to terminal operators. These people engage in the actual business of moving cargo. Ports are generally patrolled by local police officers but all tenants must provide individual security. Access to ports is generally provided along truck ways or causeways where incoming cargo is searched upon entering the facility. Unless proper equipment is utilized to conduct these searches, the exercise can become an exercise in futility.
  • 15. Protecting Maritime Facilities The U.S. Coast Guard has established port security zones in all U.S. ports. They screen, though not all physically, all arriving commercial vessels. Port security measures are imposed on an 'as needed' basis. The U.S. Coast Guard has also established protection zones for a distance of 500 yards around all U.S. naval vessels in navigable waters of the United States.
  • 16. Port of Long Beach Security
  • 17. Protecting Mass Transit The evolution of urban public transportation systems from horse-drawn street cars to automobiles, buses, and complex subway and elevated train systems has transformed the industry and its associated security requirements. In an attack against a mass transit system, local law enforcement would take the lead in preparing for, preventing, and responding. Most American cities give responsibility for mass transit security to municipal law enforcement agencies, although some larger municipalities support designated forces. The Department of Homeland Security announced in November 2003 that it allocated $750 million for the Urban Area Security Initiative (UASI). The program provides monies to urban areas to enhance overall security and preparedness levels in order to prevent, respond, and recover from acts of terrorism.
  • 18. Protecting Mass Transit As part of a commitment to directing funds to urban areas, which have been designated as critical national infrastructures, DHS has selected several urban areas to receive the largest portion of funds: up to $675 million. The DHS based the decision on a formula that took into account factors including critical infrastructure, population density, and credible threat intelligence. In December 2002, the Government Accounting Office issued a report outlining the vulnerability of buses and commuter rail systems. The report conducted in-depth reviews of ten transit agencies and concludes that while commuter transit systems could be targets of terrorist attacks, insufficient funding, coordination and sharing of critical information are inhibiting efforts to make the systems more secure. Approximately 14 million Americans use mass transit every workday. The key to a better response against a mass transit attack is better technology and better training.
  • 19. TRANSPORTATION IN 2 learns about the newly created transit counter terrorism team
  • 20. Protecting Highways/Trucking The purpose of the Highway Watch Program is to promote security awareness among all segments of the motor carrier transportation community. This program trains commercial drivers to observe and report any suspicious activities or items that may threaten the highway transportation system. Authority for the program was originally contained in the fiscal year 2003 Appropriations Act under Public Law 108-7 and included an amount of $19,700,000. On an average day, more than 7.5 million vehicles and approximately 10.5 million holders of commercial driver’s licenses (CDL’s) are on U.S. roads. Almost 2.5 million of the drivers have an endorsement, which permits them to haul hazardous cargo. According to U.S. Customs, more than 11.2 million trucks entered the United States in 2001. The job of protecting them and their cargo is incredible and hard to grasp. Of particular significance in evaluating the safety and security of the trucking industry, is of course, the huge numbers of people involved. Those people who typically come into contact with vehicles include drivers, mechanics, washers, loading and unloading personnel, and commercial vehicle inspectors. In order for any semblance of security to prevail, these positions must be filled with qualified employees who are provided with appropriate supervision.
  • 21. TSA Checkpoints Now On Interstate Highways
  • 22. Protecting Pipelines There are approximately 200,000 miles of oil pipeline alone in the United States. The industry has taken steps to increase close surveillance of pipelines, implement even more restrictions to access vital points along routes, and to expand the physical patrolling of the lines. Presidential Decision Directive 63 assigned lead responsibility for pipeline infrastructure protection to the Department of Transportation. Immediately after 9/11 the Office of Pipeline Safety issued emergency bulletins to oil and gas companies and also removed from its website detailed diagrams representing the locations of the nation’s pipelines. The OPS also conducted a detailed vulnerability assessment of exactly which pipeline facilities were absolutely critical to the economic and defense capabilities of the nation. The industry soon came to focus on critical pipeline facilities, control centers, pump and compressor stations, and storage facilities.
  • 23. Oil and gas security solutions from Siemens
  • 24. Conclusion The world faces a two-branched challenge both to maintain the security of transportation systems and continue to ensure the free flow of commerce. The Department of Homeland Security consolidated 22 different agencies in an attempt to orchestrate a network of standardized security for each transportation component. However, now several years since the tragedy on 9/11, the bureaucracy has yet to really accomplish all but the beginnings of a security program based on time tested protocols of risk management. The efforts are often under-funded, overlapping, insufficient and redundant, and have only recently expanded outside the air component.
  • 25. Case Study: If you were asked to be a contributing consultant on the planning and development of a new port in New Orleans, what policies, processes, and procedures would you recommend to adequately protect the maritime industry using this facility; i.e., rail access, truck access, pipeline access and possibly mass transit to a cruise ship terminal?