E A Framework for Planning Cost-Effective Rail Security Against a Terrorist Attack

advertisement
Research Brief
Homeland Security
A R A N D I N F R A S T R U C T U R E , S A F E T Y, A N D E N V I R O N M E N T P R O G R A M
A Framework for Planning Cost-Effective Rail Security
Against a Terrorist Attack
RAND RESEARCH AREAS
THE ARTS
CHILD POLICY
CIVIL JUSTICE
EDUCATION
ENERGY AND ENVIRONMENT
HEALTH AND HEALTH CARE
INTERNATIONAL AFFAIRS
NATIONAL SECURITY
POPULATION AND AGING
PUBLIC SAFETY
SCIENCE AND TECHNOLOGY
SUBSTANCE ABUSE
TERRORISM AND
HOMELAND SECURITY
TRANSPORTATION AND
INFRASTRUCTURE
WORKFORCE AND WORKPLACE
E
ach weekday, more than 12 million passengers take to U.S. railways. While there
have been no successful attacks on U.S. rail
systems recently, attacks on passenger-rail
systems around the world—such as the London
Underground in 2005—highlight the vulnerability of rail travel and the importance of rail
security for passengers.
RAND researchers have developed a framework
for security planners and policymakers to guide
cost-effective rail-security planning, specifically
for the risk of terrorism, and demonstrated its use
on a notional intracity rail system that characterizes
rail systems typically found in the United States.
From Where Is the Threat Likely to Come?
This product is part of the
RAND Corporation research
brief series. RAND research
briefs present policy-oriented
summaries of published,
peer-reviewed documents.
Corporate Headquarters
1776 Main Street
P.O. Box 2138
Santa Monica, California
90407-2138
TEL 310.393.0411
FAX 310.393.4818
© RAND 2007
www.rand.org
Drawing primarily on available data on past
terrorist attacks on rail systems from the RANDMIPT Terrorist Incident Database, the study
found that bombings are the most prevalent
terrorist threat to rail systems; that most such
attacks produce few fatalities and injuries; and
that attacks in densely packed rail cars and
interior rail-facility locations are of particular
concern because of the casualties they can produce. Not all such attacks come from explosives,
so security measures must address both explosive
devices and the possibility of rarer attack modes.
Also, given the damage from a relatively small
number of large attacks, security measures that
prevent only the largest-scale attacks could significantly reduce the associated human costs.
How and Where Is a Rail System Most
at Risk?
To understand how to protect rail systems, we
examined 11 potential attack locations in a rail
system and then subjected them to eight potential attack modes. Each of the resulting scenarios
was then categorized as high, medium, low, or
no risk. (The latter occurs when the target-attack
Abstract
U.S. communities depend on reliable, safe,
and secure rail systems, but such systems
are vulnerable to terrorist attack. This brief
explains a framework for security planners
and policymakers to guide cost-effective railsecurity planning and applies it to a notional
rail system that characterizes rail systems
typically found in the United States. While the
analysis results are specific to the notional system, the framework itself is useful for planning
rail-security options.
combination is not possible.) The figure shows
the results of that qualitative filtering.
We note that some rail-attack modes are
more of a concern than others. For example, the
use of small explosives is a high or medium risk
for most targets, while hoaxes or threats pose a
risk for only a few targets. Second, some targets
are more of a concern than others. For example,
the target of system-operation and power infrastructure is a high or medium risk for seven of
the eight attack modes. Then again, underground
infrastructure is less of a target when assessed
against the attack modes.
How Can We Think About Protecting a
Notional Rail System?
In thinking about how to defend rail systems,
we started with a relatively simple, notional rail
network located within a major metropolitan
area, consisting of five spokes of unique rail lines
going directly into one hub station, with the
only transfer point between these lines located at
the hub station. We assumed that the notional
rail-security system would have some security
measures in place. Finally, we adopted a Federal
Transit Administration vision of a multilayered
Elevated
station
Ground-level
station
Ground level
System-operation
and power
infrastructure
Below-ground
station
Weapon placed
inside train
Underground
vehicle
stations
Station
access and
pathways
Large
explosive
Small
explosive
Underground
infrastructure
External,
underground
Ground-level
attack on
the train
stations
High
High
High
Large
incendiary
High
Medium
High
Medium
External,
ground-level
or elevated
Ground-level
attack on
infrastructure
train
Elevated
infrastructure
Elevated
station
Systemoperation
and power
infrastructure
High
High
High
High
High
High
High
Low
High
Medium
High
High
High
Low
High
Low
Medium
Medium
Small
incendiary
High
High
Low
Low
Medium
Low
Medium
Medium
Armed attack
High
High
High
Medium
High
High
High
Medium
Unconventional
weapon
High
High
Medium
Medium
Low
Sabotage
Hoax or threat
Medium
Low
Medium
High
Low
High
High
Low
High
High
High
Low
transportation-security system, in which we defined security
layers going from safeguarding the outermost perimeter to
the exterior, interior, and restricted-access areas to the innermost rail-security asset, the trains.
Having defined the notional system’s existing security, we
identified 17 security-improvement options and assessed their
relative effectiveness across the security layers. We evaluated
effectiveness by assessing how well the options prevented or
reduced the probability of a specific terrorist attack occurring,
reduced or averted the number of passenger fatalities in the
system, reduced the time necessary for system facilities and
infrastructure to be restored and operations fully resumed, and
minimized rail-operating revenue losses. We rated options in
terms of both their incremental impact at each layer and their
potential system-level contribution across layers.
At the system level (integrating across layers), we identified four broad categories of cost-effective security measures
for system operators to consider in terms of effectiveness for
dollar metric payoffs: (1) relatively inexpensive solutions with
the highest effectiveness (e.g., enhanced security training);
(2) additional inexpensive solutions to consider with reasonable levels of effectiveness (e.g., installing retractable bollards at
entrances and exits of the operation-control center and power
plant); (3) costlier solutions with highest effectiveness (e.g.,
installing fixed barriers at curbsides adjacent to all entrances
Low
Medium
and passageways leading to ground-level and underground
stations); and (4) relatively expensive, longer-term solutions for
future consideration (e.g., rail-vehicle surveillance systems).
Conclusions
The prioritized options are specific to the notional system
analyzed, and the analysis captures a point in time, such that
the current costs for those options and their current perceived
effectiveness drive the attractiveness of different options.
Thus, even if the preferred options are viewed as reasonable
for a given system, even that conclusion is perishable.
These limitations notwithstanding, the framework itself is
useful for planning rail-security options but should be tested
against other systems of varying complexity. Such testing will
yield two insights. First, it will help us better understand whether
the portfolio of preferred options varies with system complexity
or is largely the same regardless. Since risk and the nature of
preexisting measures vary by the type of system examined, such
testing will also give some insight into the dynamic nature of the
threat and security assessment process and, perhaps, the timeline
over which the assessments need to be repeated to counter the
fact that terrorists wield new methods and learn their potential
targets’ defenses over time. Second, applying the framework to
systems of differing complexity will allow us to better understand
the information demands that the framework imposes. ■
This research brief describes work done for RAND Infrastructure, Safety, and Environment documented in Securing America’s
Passenger-Rail Systems, by Jeremy M. Wilson, Brian A. Jackson, Mel Eisman, Paul Steinberg, and K. Jack Riley, MG-705-NIJ (available
at http://www.rand.org/pubs/monographs/MG705/), 2007, 142 pp., $28, ISBN: 978-0-8330-4117-3. The RAND Corporation is a
nonprofit research organization providing objective analysis and effective solutions that address the challenges facing the public and
private sectors around the world. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors.
R® is a registered trademark.
RAND Offices
Santa Monica, CA
•
Washington, DC
•
Pittsburgh, PA
•
Jackson, MS / New Orleans, LA
•
Cambridge, UK
•
Doha, QA
RB-9309-NIJ (2007)
THE ARTS
CHILD POLICY
This PDF document was made available from www.rand.org as a public
service of the RAND Corporation.
CIVIL JUSTICE
EDUCATION
ENERGY AND ENVIRONMENT
HEALTH AND HEALTH CARE
INTERNATIONAL AFFAIRS
NATIONAL SECURITY
This product is part of the RAND Corporation
research brief series. RAND research briefs present
policy-oriented summaries of individual published, peerreviewed documents or of a body of published work.
POPULATION AND AGING
PUBLIC SAFETY
SCIENCE AND TECHNOLOGY
SUBSTANCE ABUSE
TERRORISM AND
HOMELAND SECURITY
TRANSPORTATION AND
INFRASTRUCTURE
The RAND Corporation is a nonprofit research
organization providing objective analysis and effective
solutions that address the challenges facing the public
and private sectors around the world.
WORKFORCE AND WORKPLACE
Support RAND
Browse Books & Publications
Make a charitable contribution
For More Information
Visit RAND at www.rand.org
Explore the RAND Homeland Security Program
View document details
Limited Electronic Distribution Rights
This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later
in this work. This electronic representation of RAND intellectual property is provided for non-commercial
use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are
protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form,
any of our research documents for commercial use. For information on reprint and linking permissions, please
see RAND Permissions.
Download