Full Report - University of South Florida

advertisement
“Identification of Cost-Effective Methods to Improve Security at
Transit Operating/Maintenance Facilities and Passenger Stations”
July 2006
FTA-FL-26-71054-03
“Identification of Cost-Effective Methods to Improve Security at
Transit Operating/Maintenance Facilities and Passenger Stations”
Final Report
July 2006
Prepared by
Lisa Staes
Amber Reep
Rajesh Chaudhary
James Tucci
Deborah Sapper
Center for Urban Transportation Research, University of South Florida
4202 East Fowler Avenue
CUT100, Tampa, Florida 33620
Randy Borum
University of South Florida, Mental Health Law and Policy
Tampa, Florida
Arthur J. Kelly III
New Bedford Policy Department, MA (ret’d)
Prepared for
U.S. Department of Transportation
Federal Transit Administration
Attn: Irving Chambers
400 Seventh Street, SW, Room 9402
Washington, D.C. 20590
Project Number
FTA-FL-26-71054-03
ii
FTA-FL-26-71054-03
iii
FTA-FL-26-71054-03
Technical Report Documentation Page
1. Report No.
2. Government Accession No.
3. Recipient's Catalog No.
4. Title and Subtitle
5. Report Date
Identification of Cost-Effective Methods to Improve Security at Transit
Operating/Maintenance Facilities and Passenger Stations
6. Performing Organization Code
7. Author(s)
8. Performing Organization Report No.
July 2006
Lisa Staes, Amber Reep, Rajesh Chaudhary, James Tucci,
Deborah Sapper, Randy Borum, Arthur Kelly III
9. Performing Organization Name and Address
10. Work Unit No. (TRAIS)
Florida Atlantic University /University Consortium for Intermodal
Transportation Safety and Security (UCITSS Headquarters)
5353 Parkside Drive, Suite 200
Jupiter, FL 33458
12. Sponsoring Agency Name and Address
11. Contract or Grant No.
FTA-FL-26-71054-03
13. Type of Report and Period Covered
U.S. Department of Transportation
Federal Transit Administration
400 Seventh Street, SW, Room 9402
Washington, D.C. 20590
Final Report
14. Sponsoring Agency Code
6407
15. Supplementary Notes
This project was funded under the Federal Transit Administration, FY 2004 Earmark, State of Florida,
Florida Atlantic University/University Consortium Intermodal Transportation Safety and Security. This
project is a Congressional earmark...
16. Abstract
Prior to the terrorist attacks on September 11, 2001, the United States’ transit systems did a fairly successful
job of safely and securely protecting their facilities and passengers. Until that time, public transit security issues
generally dealt only with unruly passengers, fare evasion, vandalism, trespassing, and theft. With the events of
9/11, the public transit bombing attacks in Madrid, and the biological attacks in Japan, the U.S. has become more
focused on the issue of terrorism and is hardening the security of our public transit systems against terrorist
activities.
Most U.S. transit systems are increasing their security measures at both their operating/maintenance facilities
and passenger stations, but with limited funding. This research report investigates several agencies that have
innovatively and creatively implemented cost-effective methods of increasing security at their systems. In
addition, this report provides a historic summary of the consequences of terrorism on public transportation
systems and a literature review of existing resources.
17. Key Words
18. Distribution Statement
No restriction. This document is available to the
public from the sponsoring agency at the website
http://www.fta.dot.gov .
TRANSIT SECURITY
19. Security Classif. (of this report)
Unclassified
20. Security Classif. (of this page)
21. No. of Pages
Unclassified
xxx
Form DOT F 1700.7 (8-72)
22. Price
Reproduction of completed page authorized
iv
FTA-FL-26-71054-03
v
FTA-FL-26-71054-03
ACKNOWLEDGEMENTS
This report on the “Identification of Cost-Effective Methods to Improve Security at Transit
Operation/Maintenance Facilities and Passenger Stations” is the result of contributions from a
number of individuals, transit authorities, and federal agencies. The Federal Transit
Administration funded the research for this report through the University Consortium for
Intermodal Transportation Safety and Security (UCITSS). The Center for Urban Transportation
Research (CUTR) at the University of South Florida served as the primary administrators and
researchers for this research project.
The information in this research report is derived from interviews, literature reviews, case
studies, site visits and previous work in this area. The case studies were conducted via
visits/reviews of transit properties and interviews with transit personnel. The participation and
cooperation of these transit agencies’ general managers, security personnel and other key staff
was critical in the creation of this research.
The principal investigators of the project were Lisa Staes and Amber Reep of CUTR.
Acknowledgements need to give to several key contributors including: V. Ray Cole, Robert
Brinson, Francis O’Hare from K & J Safety and Security Consulting Services, Inc., Arthur J.
Kelly III, New Bedford Policy Department (retired) and Randy Borum from the University of
South Florida The principal investigators would like to sincerely thank Dr. Steven Polzin from
the Center for Urban Transportation Research at the University of South Florida for his
coordination efforts with UCITSS.
Several key transit personnel and their transit agencies need to be acknowledged for their
willingness to participate in this study: Daniel O. Hartwig, Police Lieutenant, Counter
Terrorism/Criminal Intelligence/Swat, BART Police Department; David A. Genova, Manager,
Public Safety, Regional Transportation District (RTD); John F. Tarbert, Manager of
Security/Transit Police Chief, Regional Transportation District (RTD); James Dougherty,
General Manager of Safety & Security, Charlotte Area Transit System (CATS); William
Zielonka, Safety and Security Operations Division, Central Florida Regional Transportation
Authority (LYNX); Anthony Policastro, PROTECT program manager, Argonne National
Laboratory; Polly Hanson, Chief of the Metro Transit Police, Washington Metropolitan Area
Transit Authority (WMATA), Metro Transit, Joseph Carter, Chief, MBTA Transit Police, Paul
MacMillan, Deputy Chief, MBTA Transit Police, Bob Fitzsimmons, Sergeant, MBTA Transit
Police, and Sean McCarthy, Deputy Chief, Operations Control Center , MBTA Transit Police.
vi
FTA-FL-26-71054-03
EXECUTIVE SUMMARY
Prior to the terrorist attacks on September 11, 2001, transit systems in the U.S. did an adequate
job of addressing the safety and security of protecting their facilities and passengers. Until that
time, however, public transit security issues generally dealt only with unruly passengers, fare
evasion, vandalism, trespassing, and theft. With the events of 9/11, the public transit bombing
attacks in Madrid; and the biological attacks in Japan, the United States has become more
focused on the issue of terrorism and is hardening the security of our public transit systems
against terrorist activities.
Most U.S. transit systems are increasing their security measures at both their operating and
maintenance facilities and passenger stations, but funding is limited. This research report
investigates six transit agencies that have successfully and creatively implemented innovative
and cost-effective methods for increasing security at their systems.
The first section of this report provides this report provides a historic summary of the
consequences of terrorism on public transportation systems and a literature review of existing
resources. An introduction and overview of the safety and security challenges faced by U.S.
public transit agencies as well as the day-to-day challenges of successfully managing the security
of an open access public transit system are provided.
A brief literature review identifies several key transit security reports and documents used in this
study. Additionally, more in-depth, detailed reports, documents, and tools are provided on the
new “Transit Security Reference Resource” website, www.cutr.usf.edu/security, which was
specifically designed for this study to provide a more up-to-date and dynamic literature review.
This website was designed to provide a one-of-a-kind resource for transit security personnel to
find reports, papers, documents, contacts and learn about industry best practices.
The last section of this report identifies six U.S. transit systems that have conducted safety and
security activities. Each case study provides an overview of the transit system, a statement of the
problem identification and need for innovative security measures, a description of the transit
system’s previous attempts to address the problem, an outline of the proposed solution, a costbenefit analysis, performance indicators and lessons learned.
FTA-FL-26-71054-03
vii
FTA-FL-26-71054-03
viii
TABLE OF CONTENTS
Acknowledgements ...................................................................................................................vi
Executive Summary ................................................................................................................ viii
Introduction ................................................................................................................................1
Asset and Vulnerability Assessment ............................................................................................2
Vulnerability Assessment .............................................................................................................4
Threat Assessments.......................................................................................................................5
Physical Security...........................................................................................................................8
Incident Planning and Response .................................................................................................10
Conclusion ..................................................................................................................................12
Literature Review and Transit Security Reference Resource ..............................................15
Security Design...........................................................................................................................15
Security/Emergency Planning.....................................................................................................15
Security Funding.........................................................................................................................19
Detection and Deterrence............................................................................................................19
Transit Security Reference Resource..........................................................................................22
Case Studies/Best Practices......................................................................................................27
Introduction.........................……………………………………………………………………27
Case Studies:...............................................................................................................................27
Denver Regional Transit District .......................................................................................29
Washington Metropolitan Area Transit Authority.............................................................39
Charlotte Area Transit System...........................................................................................49
Massachusetts Bay Transportation Authority....................................................................59
Central Florida Regional Transportation Authority...........................................................67
Bay Area Rapid Transit ....................................................................................................77
Summary and Conclusion .......................................................................................................85
References..................................................................................................................................91
FTA-FL-26-71054-03
ix
FTA-FL-26-71054-03
x
INTRODUCTION
In July 2005, two planned terrorist attacks on London’s public transit system shifted international
concern about terrorist targets from the skies to surface transportation systems. A total of 37
people were killed in those attacks and another 1,000 were injured, sharply focusing the world on
the vulnerability of public transit systems. While the airborne attacks on the United States of
September 11, 2001 were unusually catastrophic and horrific, the reality is that worldwide
terrorist attacks against surface-based mass transit systems have been more frequent and more
lethal than those directed against any other category of targets. Nearly one of every three
recorded acts of terrorism internationally has been directed against transportation.1
More than one third of terrorist attacks on transportation targets have involved fatalities (a higher
fatality rate than for any other category of targets), and most of those involved multiple deaths.
Because of their criticality, accessibility, containment, and personnel density, Rand security
analyst Brian Jenkins has aptly referred to transportation facilities and vehicles as “ideal targets”
of terrorism. As shown in Table 1, buses and subways have been the most common target of
public transit terrorist attacks.
Table 1
Targets of Attacks on
Public Transit Systems
Buses
Bus Terminals
Tourist Buses
School Buses
Subways and Trains
Subways and Train Stations
Rails
Bridges and Tunnels
Other
32%
7%
7%
1%
26%
12%
8%
5%
2%
The attacks in London were the most recent high-profile transit attacks, but they certainly were
not an anomaly. On March 11, 2004, 191 people were killed in a succession of terrorist bombing
attacks on multiple commuter trains in Madrid. On June 5, 2003, terrorists detonated a bomb on
a bus in Chechnya, killing 16 people. Since 2000, numerous bombings—many of them suicide
bombings—have occurred on buses throughout Gaza and Israel. Perhaps most frightening was
the 1995 sarin nerve gas attack on a subway in Tokyo, the first major incident that involved the
use of weapons of mass destruction (WMDs). Although the attack produced eight fatalities,
thousands more were injured, and the psychological and economic impacts were absolutely
devastating.
1
Government Accountability Office. December 2002. “Mass Transit: Federal Action Could
Help Transit Agencies Address Security Challenges.” GAO-03-263. Washington, DC: GAO.
FTA-FL-26-71054-03
1
The evolving nature of trans-national terrorism makes the targeting of public transit systems
even more worrisome. The methods and objectives of terrorists in the past have fit with Jenkins’
analysis in 1974 that “terrorism is theatre. Terrorists want a lot of people watching, not a lot of
people dead.” Tragically, in the current security environment, Jenkins and others have observed
that this maxim no longer holds true. Since the coalescence of al Qaeda and its affiliated factors,
cells, and entities, mass casualties have been an explicit objective. The implication of this
mindset for critical infrastructure protection is that terrorists will select their targets not only for
their symbolic value or functional importance, but also based on the potential to inflict death and
injury in venues where people ordinarily feel safe.
Not only radical foreign groups threaten public transit systems; domestic terrorism is also a
concern. One of the most deadly terrorist attacks in the United States occurred on April 19,
1995, when the Alfred P. Murrah Federal Building in Oklahoma City was bombed, an attack that
was planned and carried out by two United States citizens. This event resulted in the death of
168 people, including many children, and the injury of hundreds more. Public transit systems
may become a target for these domestic terrorists as well.
Protecting critical infrastructure requires that public transit systems identify and analyze their
assets and vulnerabilities, the potential threats, and the potential consequences of attack scenarios
in order to generate and implement effective countermeasures. A “threat” is typically defined as
any action that has the potential to cause harm in the form of death, injury, destruction of
property, interruption of operations or denial of service. A “vulnerability” is defined as anything
that can make an agency more susceptible to threats. Public transit systems are part of the
“critical infrastructure” of the nation because their effective function is vital to public health,
national defense and economy.2
This report focuses exclusively on surface public transit systems. These systems include all
multiple-occupancy vehicle services designed to transport customers on local and regional
routes, such as bus, trolley bus, commuter rail, vanpool, ferry boat, and light rail services.3 The
discussion that follows reviews the concepts and requirements for effective asset and
vulnerability analyses, threat assessments, and physical security equipment/resource deployment.
Also provided is a discussion of incident and response planning activities and the
implementation of an Incident Command System (ICS) to mitigate, contain, and respond to
attacks that may occur.
Asset and Vulnerability Analysis
Public transportations systems are designed to be convenient and accessible to the largest
possible number of people. Their success in that regard is precisely what makes them most
vulnerable and why they are considered by some as “soft targets.” Passenger airlines, for
example, have multiple checks on the identity and belongings of each of their riders. Having a
similar screening process for mass transit would be highly impractical and prohibitively
2
3
PDD-63; HSPD-7.
Government Accountability Office. 2002. “Mass Transit: Challenges in Securing Transit
Systems.” GAO-02-1075T. Washington, D.C.
FTA-FL-26-71054-03
2
expensive. The reality is that, in every country, mass transit systems carry many more passengers
than commercial airlines but have significantly fewer security personnel, less surveillance, and
less equipment with which to deter a terrorist attack. In 2002, the Transportation Research Board
identified several general characteristics of transit systems that make them vulnerable to attack:
•
•
•
•
•
they are open and highly accessible
they are extensive and ubiquitous
they emphasize efficiency and competitiveness
they have diverse owners, operators, users, and overseers
they are intertwined with society and the global economy4
Protecting open, ubiquitous systems designed for maximum access and efficiency is a daunting
task. The United States alone has 7,000 miles of transit lines; 113,000 miles of rail; 26,000 miles
of navigable waterways; and 4 million miles of roadway. London has 253 miles of underground
tunnels. Paris’s 131 miles of track hosts approximately six million passengers every day; the
Moscow Metro provides about 9 million passenger trips per day. More than 22,000 miles of rail
cover Japan, with 150 miles of subway in Tokyo. Because open transit systems are massive,
dispersed, and inherently more vulnerable, agencies must recognize that the protection of these
systems is an ongoing, active process, not a one-time event.
As illustrated in Figure 1, risk is a dynamic concept that varies as a function of target
vulnerability and the threat environment, either of which may change from day to day based on
events and information. The implication of this hydraulic model is that risk may be increased or
decreased by modifying either side of the equation. If, for example, a specific, credible threat is
directed to an identified target, then its risk would increase even if there was no change in the
target’s vulnerability. Conversely, in a high-threat environment, target risk may be mitigated by
reducing vulnerability (e.g., increasing access control, utilizing surveillance systems
incorporating Crime Prevention through Environmental Design (CPTED) concepts in facilities
planning and construction activities, etc.). Risk lies at the confluence of threat and vulnerability.
Understanding this principle of risk analysis is vital to protection and security.
Risk Analysis Model
Figure 1. Risk Analysis Model
Vulnerabilit
4
Threat
Transportation Research Board. 2002. “Deterrence, Protection, and Preparation: The New
Transportation Security Imperative.” Washington, DC: Transportation Research Board,
National Academy of Sciences.
FTA-FL-26-71054-03
3
Threat assessment and vulnerability assessment are related but distinct tasks. Threat assessment
focuses on the probable and likely types of attacks that may be perpetrated by potential
adversaries in a range of scenarios. Table 2 is a list of terrorist attack scenarios considered in a
recent U.S. Department of Transportation Vulnerability Assessment. Vulnerability assessment
focuses on the susceptibility of potential targets to unauthorized access, penetration with
weapons or tools intended for harm, and the likely impacts or effects of attacks on protected
assets (e.g., injuries, deaths, and physical damage to equipment and infrastructure). Some
common attack threats include:
•
•
•
•
•
•
•
•
arson
explosives
weapons of mass destruction
violent incidents and hostage situations
tampering
loss of power
use of a transit vehicle as a weapon
network failure/cyber attack
Vulnerability Assessment
Terrorists search continuously for vulnerabilities in the target environment. Public transit
systems, therefore, must also be aware of the vulnerabilities and weaknesses in their protective
systems. Vulnerability assessments should be completed for each transit mode and should be
regularly updated. Many assessment tools and aids exist to support public transit systems in
conducting these appraisals. In the U.S., for example, the Department of Homeland Security
(DHS) collaborated with the American Public Transportation Association (APTA) and the
Federal Transit Administration (FTA) to create the DHS Vulnerability Identification SelfAssessment Risk Tool (VISAT). Specific VISAT modules exist for mass transit (heavy
rail/subways), rail passenger stations, highway bridges, maritime, and operations centers. Others
are still being developed. Assessors must gauge the attractiveness of the target from a terrorist's
perspective and rate several consequence categories pertaining to public health, economic impact
and symbolic value. While some of the specific items are security sensitive, some of the main
categories covered in a vulnerability assessment typically include:
•
•
•
•
•
•
•
•
•
•
•
facility characteristics
type of security force
physical security measures
routes of access/egress
communications
availability of additional security and emergency responder resources
response time/distance for specialized security personnel
response time/distance for emergency responder personnel
proximity to critical areas within the community
geographic location and accessibility
proximity to international borders
FTA-FL-26-71054-03
4
Table 2
Scenarios Considered in the DOT Vulnerability Assessment
Physical Attacks
• car bomb at bridge approach
• series of small explosives on highway
bridge
• single small explosive on highway
bridge
• single small explosive in highway
tunnel
• car bomb in highway tunnel
• series of car bombs on adjacent bridges
or tunnels
• bomb(s) detonated at pipeline
compressor stations
• bomb detonated at pipeline storage
facility
• bomb detonated on pipeline segment
• simultaneous attacks on ports
• terrorist bombing of waterfront pavilion
• container vessel fire at marine terminal
• ramming of railroad bridge by maritime
vessel
• attack on passenger vessel in port
• shooting in rail station
• vehicle bomb adjacent to rail station
• bombing of airport transit station
• bombing of underwater transit tunnel
• bus bombing
• deliberate blocking of highway-rail
grade crossing
• terrorist bombing of rail tunnel
•
•
•
•
•
bomb detonated on train in rail station
vandalism of track structure and signal
system
terrorist bombing of rail bridge
explosives attack on multiple rail
bridges
explosive in cargo of passenger aircraft
Biological Attacks
• biological release in highway tunnel
• anthrax release from freight ship
• anthrax release in transit station
• anthrax release on passenger train
Chemical Attacks
• sarin release in multiple subway stations
• physical attack on railcar carrying a
toxic chemical
Cyber and C3 Attacks
• cyber attack on highway traffic control
system
• cyber attack on pipeline automated
control system
• attack on port power and
telecommunications facility
• sabotage of train control system
• tampering with rail signals
• cyber attack on train control center
Source: Wegmann, F., & Everett, J. 2003. The Role of Security in the Surface Transportation Programming
Process. Knoxville, TN: Southeastern Transportation Center.
Threat Assessment
Threat assessment, like vulnerability assessment, must be an ongoing process. All transit systems
should have a process in place to support the identification, assessment, and management of
FTA-FL-26-71054-03
5
threats to protected assets. These three functions (i.e., identify, assess, and manage) form the
foundation of an effective threat assessment program.5
To understand the proper scope of the threat assessment function, it is necessary to clarify what
constitutes a threat. One conventional approach is to confine the definition of “threat” to a
written or verbal communication of intent to harm. A major limitation of this approach is that it
fails to account for situations where there are indications of planning and preparation for an
attack, but no advance threatening communication directed to the target. In an early study of
threatening communications directed to celebrities and political officials, Dietz and Martell
(1989) dispelled the conventional wisdom about threats:
We have disproved the myth that threats and threateners are the only
communications or people of concern. The most common assumption in all
quarters—laymen, mental health professionals, law enforcement processionals
and lawmakers—is that threats foretell more dangerous behavior, but that other
odd communications do not. This is a groundless assumption and the source of
more misguided policy and decision making than any other error in this field. 6
An important distinction exists between making a threat (communicating intent to harm) and
posing a threat (engaging planning or preparation in furtherance of an attack). All communicated
threats must be taken seriously and investigated; however, people make threats for a variety of
reasons, and many who do so do not follow through. Moreover, some individuals and groups
seeking to attack transit targets do not communicate a threat before taking action. Simply stated,
many who make threats do not pose a threat, while some who pose a threat never make one.7
In the absence of receiving communicated threats, identifying warning indicators of a potential
attack becomes a critical challenge. Physical security and surveillance equipment can support
that effort; however, the enormous scope of the task and associated costs could quickly
compromise the efficiency of transit operations or become prohibitively personnel intensive.
Timely, accurate and useable information becomes critical. Transit security managers must
coordinate and develop collaborative relationships with intelligence agencies, federal, state and
local law enforcement, and with other transit systems to ensure that they have access to the best
information possible, as soon as it is available. An additional strategy that has been used with
some success by transit systems around the world is to mobilize passengers and transit operators
as watchful “eyes and ears,” asking them to monitor and report suspicious activity.
While encouraging the public to identify and act on their suspicions has clear benefits, concerns
have understandably emerged about racial or ethnic bias and “profiling.” The idea that there is an
accurate, useful profile of the terrorist is popular, but misguided. As an approach for identifying
5
Fein, R. A., & Vossekuil, B. 1998. “Protective Intelligence and Threat Assessment
Investigations: A Guide for State and Local Law Enforcement Officials.” NIJ/OJP/DOJ
Publication No. NCJ 170612. Washington, DC: U.S. Department of Justice.
6
Dietz, P., & Martell, D. 1989. “Mentally Disordered Offenders in Pursuit of Celebrities and
Politicians. Final Report.” Washington, D.C.: National Institute of Justice, pp. 166-167.
7
Fein & Vossekuil.
FTA-FL-26-71054-03
6
indicators of a pending attack, it is also inefficient. If, for example, one were to extrapolate a profile
from the September 11 attacks on the U.S., it might describe an Arab male in his late 20s or early
30s. The problem, of course, is that terrorism is relatively rare. The statistical reality is that the vast
majority of people who “fit” that or any other profile will not engage in an act of terrorism. The
reverse problem, though, is at least equally as troubling. There have been (and will continue to be)
people who commit these acts who do not fit any known profile.8
Therefore, an effective threat assessment program—or even a passenger/observer watch
program—must focus first and primarily on behavior. Behaviors are the most specific indicators
of pre-incident activity. Terrorists and other attackers typically follow a behavioral pathway as
they move from an initial idea about an attack to its execution. When those behaviors are
observed and identified they can warn of possible terrorist planning and preparation.9 The U. S.
Transit Watch Program is supported by APTA and provides “suspicious indicators” for the
purpose of assisting passengers and transit operators observe and identify such behaviors (see
Table 3).
Table 3
Suspicious Indicators from the U.S. Transit Watch Program
Behavior
If you spot any suspicious individuals engaged in questionable activity, look for the following:
• Visible signs of nervousness
• Excessive sweating
• Sprayer bottles or aerosol canisters
• Inappropriate clothing that is excessively baggy or too heavy in warm weather
Packages
If you spot an unattended package, look for the following:
• Placement in an out-of-the-way location
• Individuals in the act of abandoning the package and hastily departing the area
• Unusual attached batteries, wires, tanks, bottles or bags that might contain chemicals
• An attached message
• A suspicious cloud, mist, gas, vapor, odor or seeping fluid
• Nearby individuals showing signs of illness or distress
Recommended Course of action
• Do not confront suspicious individuals.
• Contact a transit employee or the police immediately.
• In the event of a suspicious package, do not use a cellular phone until you are a safe
distance away.
Source: Transit Watch Brochure, Washington, DC..: Federal Transit Administration.
8
Borum, R., Fein, R., Vossekuil, B., & Gelles, M. 2003. “Profiling Hazards: Profiling in
Counterterrorism and Homeland Security.” Counterterrorism and Homeland Security Reports
10(4) 1, pp. 12-13.
9
Fein & Vossekuil.
FTA-FL-26-71054-03
7
When behavior or communication of concern comes to the attention of security officials, it must
be appropriately assessed.10 One level of assessment involves the use of technical measures to
detect weapons or harmful substances. For example, if an unattended backpack is reported on a
passenger train, an explosive detection K-9 unit (bomb-sniffing dogs) may be initially deployed
to screen the item. An even more complicated situation arises when the threat inquiry or
assessment focuses on people and on information rather than objects or materials. The system
should have a procedure for assessing threats and incoming intelligence and making
recommendations for transit operations.
Physical Security
Physical security involves the proactive deployment of physical resources to safeguard
personnel, to prevent unauthorized access to material (equipment, facilities and documents) and
to protect it against sabotage, damage, and theft. Because resources are limited, all assets cannot
have maximum protection at all times. The dynamic element of physical security involves
adjusting and allocating physical measures according to the assessed level of threat and target
vulnerability. The objective of these measures is to deter attacks by “opportunity reduction” or
“displacement.” The process is commonly referred to as “target hardening.”
The technological sophistication of physical security equipment varies widely. It may be as
simple as suitable lighting for dark or dimly lit passenger areas to retinal scanners and advanced
biometric sensors. Security equipment spans several categories and serves different functions.
One common category of measures deters infiltration through active monitoring and
surveillance, using devices such as CCTV cameras and recordings. Another class of equipment is
designed primarily for access control, so that only authorized or recognized persons can enter a
designated area. Access control measures may use electronically coded cards, passwords, retinal
scanners, or biometric indicators, such as fingerprints. Other equipment detects weapons (e.g.,
magnetometers) or impermissible materials (e.g., radiation, explosives, etc.) and warns of their
presence. Finally, perimeter security devices are designed to protect outer and inner perimeters
surrounding sensitive areas or assets. Inner perimeter devices (e.g., alarm systems) detect and
warn of any breach or penetration of a specified inner perimeter or secure zones, such as fare
collection drop areas, fueling areas, etc. Outer perimeter devices are designed to impede access
of people and vehicles into a zone of proximity that increases risk to the target (e.g., anti-vehicle
barriers).
In 2004, the American Public Transportation Association conducted a national survey of security
needs and funding priorities among transit agencies. A substantial majority of them (88.3%) said
they had adopted new security measures since September 11, 2001. Funding for additional
security and law enforcement personnel, training, and preparatory drills were rated as high
priority operating needs. The five most important physical security measures were:
10
Borum, R., Fein, R., Vossekuil, B., & Berglund, J. 1999. “Threat Assessment: Defining an
Approach for Evaluating Risk of Targeted Violence.” Behavioral Sciences & the Law 17(3),
pp. 323-337.
FTA-FL-26-71054-03
8
•
•
•
•
•
radio communications systems, including operational control redundancy
security cameras on-board vehicles
controlled access to facilities and secure areas
security cameras in stations, and
automated vehicle locator (AVL) systems.11
Levels of physical security may vary within or across transportation modes depending on threat
level or target criticality. They may also change over time. Physical security levels have not been
uniformly standardized, but one example is presented are below. The levels are hierarchical—
that is, each successive level adds to the features of the one preceding it.
•
Minimum: Simple physical barriers, and simple locks. These are designed to impede
unauthorized external activity.
•
Low: Basic local alarm system, simple security lighting, basic security physical barriers,
and high security locks. These are designed to impede and detect unauthorized external
activity.
•
Medium: Advanced remote alarm system, high security physical barriers, and watchmen
with basic communication. These are designed to impede, detect and assess unauthorized
external activity.
•
High: CCTV, perimeter alarm system, highly trained armed guards, access controls, high
security lighting, local law enforcement coordination, and formal contingency plans.
These are designed to impede, detect and assess unauthorized external and internal
activity.
•
Maximum: Sophisticated alarm system, and onsite armed response force. These are
designed to impede, detect, assess and neutralize unauthorized external and internal
activity.
The primary guiding strategy for securing transit systems has been to use a layered defense. The
Transportation Research Board describes the strategy as follows:
Transportation security can best be achieved through coherent security systems
that are well integrated with transportation operations and are deliberately
designed to deter terrorists even as they selectively guard against and prepare for
terrorist attacks. In particular, layered security systems, characterized by an
interleaved and concentric set of security features, have the greatest potential to
deter and protect. Layered systems cannot be breached by the defeat of a single
security feature—such as a gate or guard—as each layer provides backup for the
others, so that impermeability of individual layers is not required. Moreover, the
interleaved layers can confound the would-be terrorist. Calculating the odds of
11
American Public Transportation Association. 2004. “Survey of United States Transit System
Security Needs and Funding Priorities: Summary of Findings.” Washington, DC.
FTA-FL-26-71054-03
9
breaching a multi-tiered system of defense is far more difficult than calculating
the odds of defeating a single, perimeter protection.12
The effective installation and utilization of physical security systems and measures can
impede a terrorist’s ability to threaten a transit system. With the implementation of
layered defense mechanisms, the risk to an agency is greatly reduced.
Incident Planning and Response
Transit security managers hope for the best, but prepare for the worst. To minimize harm,
comprehensive security plans must address the entire continuum of protective action, including:
•
Prevention: This has several components, ranging from the actual stopping of an
attack before it occurs, to providing improved facility designs that prevent large
scale destruction. Surveillance, monitoring, and sensing technologies will likely
play an important role in the prevention phase of an incident.
•
Response/Mitigation: Reducing the harmful impact of an attack as it occurs and
in the immediate aftermath. This entails identifying the most effective routing for
emergency vehicles and the evacuation of large numbers of people, as well as
providing effective communication systems among emergency response teams
and for information dissemination to the general public.
•
Monitoring: Recognizing that an incident is underway, characterizing it, and
monitoring developments. Clearly, surveillance, monitoring, and sensing
technologies would be critical to this phase of incident response, as would public
information.13
Prevention should be the highest priority in protecting public transit systems from terrorist
attacks. However, transit agencies must have a comprehensive security system that includes
contingency plans to respond to incidents that may occur and mitigate their effects. Contingency
plans establish practices and procedures to follow in the event of critical incident, such as a
terrorist attack. Initiating an effective response in an emergency situation depends on advance
planning and preparation. Contingency plans must outline the essential response functions, and
address and coordinate the responsibilities of all response units and elements across multiple
service sectors (see Table 4). In most cases, a comprehensive contingency plan is best
established by a multi-disciplinary committee that may include police, fire, and medical services,
hazardous materials units, environmental agencies, power and water authorities, and the media.
As with vulnerability and threat assessments, the contingency plans must be continuously
updated and modified.
12
Transportation Research Board. 2002. “Deterrence, Protection, and Preparation: The New
Transportation Security Imperative.” Washington, DC: Transportation Research Board,
National Academy of Sciences, p. 1.
13
Meyer, M. 2002. “The Role of Metropolitan Planning Organizations in Preparing for Security
Incidents and Transportation Response.” Atlanta, GA: Georgia Institute of Technology.
FTA-FL-26-71054-03
10
Table 4
Response Considerations for Incidents Involving
WMDs or Hazardous Materials
Control and containment of a contaminated area
• Crime scene protection
• Access control
Procedures for notification of an alert or actual incident/event
• Identifying the most likely or vulnerable locations
requiring heightened awareness in each responding
agency
Triage and treatment issues
• Decontamination protocols
• Staging and mobilization locations
• Hospital response and treatment issues
The key to successfully implementing a contingency plan is a well-coordinated Incident
Command System (ICS). The ICS has five central functions:
1. Command: Sets objectives, has overall responsibility at the incident or event
• Single point of contact for media and information dissemination
• Develops safety measures and monitors safe conditions
• Liaison with agency representatives and coordinate their involvement
2. Operations: Conducts tactical operations to carry out the plan, develops the tactical
objectives, organization, and directs all resources
3. Planning: Develops the action plan to accomplish the objectives, collects and evaluates
information, maintains resource status
4. Logistics: Provides support to meet incident needs, provides resources and all other
services needed to support incident response
5. Finance/Administration: Monitors costs related to the incident, provides accounting
procurement, time recording, and cost analysis
FTA-FL-26-71054-03
11
To be adaptable to a range of different communities, the ICS concept is structured around
functions, not agencies or positions. It is necessary, therefore, that ICS be “institutionalized”
through the cooperative efforts of government and emergency management officials within a
given jurisdiction. Within the United States National Incident Management System (NIMS), is
institutionalizing ICS requires preparations at both policy and organizational/operational levels:
At the policy level, institutionalizing the ICS means government officials, i.e., governors,
mayors, county and city managers, tribal leaders and others should:
•
•
Adopt through the ICS an executive order, proclamation or legislation as the
jurisdiction's official incident response system.
Direct that incident managers and response organizations in their jurisdictions train,
exercise and use the ICS in their response operations.
At the organizational/operational level, evidence that incident managers and emergency
response organizations are institutionalizing the ICS would include the following:
•
•
•
ICS is being integrated into functional and system-wide emergency operations policies,
plans and procedures
ICS training is planned or under way for responders, supervisors and command level
officers
Responders at all levels are participating in and/or coordinating ICS-oriented exercises
that involve responders from multi-disciplines and jurisdictions.
When NIMS was established, it was not expected that all these activities would be completed in
FY 2005. It was expected that where possible they would be and that, at a minimum, planning
for such activities would be initiated and actions taken to put them into practice14.
Conclusion
Public transit systems are among the most attractive and most vulnerable terrorist targets.
Terrorist attacks on transportation are more common and more lethal than those against any other
class of target. Safeguarding systems that are designed and required to be open, accessible, and
efficient carries a multitude of challenges, but the right combination of personnel, technology
and access to information can help to keep these systems safe.
Transit security managers must first assess and confront the existing vulnerabilities of their
facilities, equipment, and systems. All assets should be accounted for, rated for criticality, and
evaluated for current security needs in the present threat environment. Security may be easily
enhanced in critical areas that do not affect passenger flow. Managers must also continuously
assess the nature and degree of threat against targets under the agencies. Threat assessment is a
continuous task that is highly reliant on timely, accurate, and usable information. Transit systems
must have liaisons and open lines of communication with intelligence officials, law enforcement,
14
NIMS Online, http://www.nimsonline.com/nims_faq.htm#incident
FTA-FL-26-71054-03
12
and with each other. Passengers and operators can also be mobilized to serve as watchful eyes
and ears of suspicious behavior or material.
The current best practice approach to transit security is to use a layered system of defense,
particularly with regard to physical security measures. All assets cannot be given maximum
protection at all times. Exceptional and innovative technologies and measures exist and are
emerging to support the surveillance, impedance, detection, and assessment of unauthorized
persons and materials within a designated perimeter. They can be deployed in accordance with
asset criticality and assessed need. Preventive measures in physical security and protective
intelligence are absolutely critical; however, transit systems must also plan for mission failures.
They must prepare to contain, mitigate and respond to a range of attack scenarios that may occur.
This will involve extensive collaboration across multiple service systems, and is most likely to
be successful if rehearsed in practice drills.
With billions of passengers around the world every day, maintaining a climate of safety and a
shield of protection for our public transit systems should be among the highest priorities for
critical infrastructure and public protection.
FTA-FL-26-71054-03
13
FTA-FL-26-71054-03
14
LITERATURE REVIEW AND
TRANSIT SECURITY REFERENCE RESOURCE
The literature review provides several reports and resources related to transit security issues.
During the review four distinct themes emerged that are highlighted in this report. They are
security design, security, emergency planning, security funding, detection and deterrence. A
summary of these reports and reports are provided below.
Security Design
“Transit Security Design Consideration” (FTA 2004) provides an overview of the major
assets of transit systems—bus and rail vehicles, transit infrastructure and communications—as
well as a preliminary assessment of the vulnerabilities to various methods of attack inherent to
each asset. A new approach of integrating security measures at the design level is proposed in the
study. A systematic approach was developed for security design for public transit systems. The
intent of this study was not to provide industry-wide standards, but rather a compendium of steps
that a transit system can use while developing a security strategy. This study provides guidance
to public transit agencies to help deter and minimize the effects of attacks against facilities,
riders, employees, and the general public. The guidance provided can be implemented as part of
efforts to harden and retrofit transit agency assets. It addresses the topics of systems integration,
access management, and communications, all of which are crucial to the protection of transit
assets.
The study illustrates transit property design elements that planners, designers, and administrators
should consider when selecting a facility location, designing a new or renovating existing
facilities to protect them against potential threats. It was noted that it would be helpful to an
agency if the integration of security measures be considered during the design phase or
renovation phase of a project to cut down cost and also make “Crime Prevention through
Environment Design” (CPTED) possible. The components discussed in the report are site layout,
interior layout, structural engineering, architectural features, and systems/services. The report
describes in detail in each of these areas and provides guidelines for increasing security.
Security/Emergency Planning
“The Public Transportation Security and Emergency Preparedness Planning Guide”
(2003) provides information on security and safety planning and response to major security
threats and emergencies. The report outlines step-by-step procedures in the system security
methodology and provides instructions on preparing a Security and Emergency Preparedness
Program (SEPP) plan. These instructions are comprehensive and can be used by the transit
agencies to develop their own SEPP plan.
Procedures are established in this report to deal with threats made via telephone or mail related to
a bomb, chemical, biological weapon, radiological threat, or other crimes including robbery,
firing, vandalism, etc. The guidelines for threats by telephone include remaining calm, activating
a recording device if any, listening carefully, explaining the consequences, and continuing the
FTA-FL-26-71054-03
15
conversation with the caller in an effort to get more information. In case of threatening mail, the
item should be placed in a separate transparent bag and other suspicious mail should also be
isolated. The response to the threats should include contacting the appropriate officials to
conduct relative searches and follow-up activities.
Guidelines are provided in the National Transit Response Mode (NTRM)l that supports the
initiative of the Office of Homeland Security. (This was FTA’s response to OHS’s Homeland
Security Advisory System [HSAS]). The National Transit Response Model supplements the
existing HSAS Threat Condition Model by Black and Purple designations to further define
appropriate transit industry activities when an attack is in progress and during the post-event
recovery of transit services and facilities. The threat levels defined in the NTRM are provided in
Table 5.
Table 5
NTRM Threat Level Identifiers
Green
Low threat level
Blue
General threat level
Yellow
Elevated threat level
Orange
High threat level
Red
Severe threat level
Black
Actual attack
Purple
Recovery
The two most critical levels of the NTRM Threat Level Identifiers are the Black and Purple
designations. The Black and Purple designations are interpreted as follows.
•
Black indicates that an attack is under way against a specific transit agency or within the
agency’s immediate geographic area. The Black level is identified only when an attack
has occurred. The Black designation also includes the post-attack time period when the
transit agency may be responding to casualties, assisting in evacuations, inspecting and
securing transit facilities, or helping with other tasks directed by the local emergency
management authority.
•
Purple is reserved for the recovery time after an attack has occurred. Purple includes
restoration of levels of service, routes, and schedules, repairing or reopening facilities,
adjustment of staff work schedules and duty assignments, responding to customer
inquiries about services, and other activities necessary to restore transit service. Purple
follows the Black and may also exist for short time periods when the agency is
transitioning from a higher threat condition to a lower threat condition (e.g., from Red to
FTA-FL-26-71054-03
16
Orange). Purple will coexist with the prevailing threat condition. In other words,
business recovery (Purple) will be accomplished while maintaining the prevailing
readiness status (e.g., Orange protective measures).
FTA recommends threat level protective measures or actions for each of the threat level
identified above. Training and communication are important in all the threat levels. Knowing
how to effectively utilize security and safety devices during a threat, resulting attack or during
the recovery phase is critical. The security devices should offer great flexibility due to the
inherently open architecture and free movement of people in transit facilities and passenger
stations. During low threat levels, it is suggested that basic security methodology be
implemented giving uninterrupted access to the general public. In times of high threat levels,
security of basic methodology should be combined with other advanced security methodologies
in the four areas: deter, detect, respond, and recover. Clear communication protocol should be
developed by the transit agencies to interact with other local, state and fed officials. It is also
suggested that evacuation routes be properly defined in any facility to ensure fast and safe
evacuation during threat/attack. Transit agencies are encouraged to establish communication
mechanisms within their facilities to effectively disseminate information.
In addition, the “Top 20 Security Program Action Items for Transit Agencies: Self
Assessment Checklist” was developed by FTA in 2003. The categories listed in the checklist
are:
• Management and Accountability
• Security Problem Identification
• Employee Selection
• Training
• Audits and Drills
• Document Control
• Access Control
• Homeland Security
The checklist will help transit agencies in assessing their current position for developing the
security program.
The “Mass Transit: Federal Actions Could Help Transit Agencies Address Security
Challenges” (GAO, December 2002) was conducted following the 9/11 attack. In this report, a
survey was conducted that clearly revealed that obtaining sufficient funding for security
measures has been the most significant challenge in making transit systems safe and secure.
The other challenges include coordination among transit stakeholders. Coordination is important
at the emergency planning level for developing security plans with the local, state and federal
agencies. The survey results also showed that limited awareness of terrorist threats to transit and
lack of coordination among various local agencies are also a contributing factor. The report
provides recommendations for the federal government’s role in funding transit safety and
security initiatives by addressing issues, including:
FTA-FL-26-71054-03
17
•
•
•
•
determining the roles of stakeholders in funding transit security
developing federal funding criteria
establishing goals and performance indicators for federal efforts in transit security
selecting the appropriate federal policy instruments (e.g., grants and regulations) to
deliver assistance that may be deemed necessary by policymakers.
It also recommended for review of legislature change allowing transit agencies to use federal
urbanized area formula fund for operating expenses.
Source: Analysis of GAO survey results
Figure 2. Most Significant Challenge to Securing Transit Systems
as Reported by Surveyed Agencies
FTA-FL-26-71054-03
18
Security Funding
“Survey of United States Transit System Security Needs and Funding Priorities: Summary
of Findings” (APTA 2004) includes results of an APTA survey of its transit agency members to
determine (a) the amount of funds they spend on and need for their security function; (b) the
extent to which they had increased and improved their security measures since 9/11; and (c) the
priorities they place on security measures that should be supported by federal funding. APTA
conducted a survey of a 120 transit agencies that operate all modes of service and are
geographically dispersed in United States. The survey results estimated a need for nearly
$6 billion of security-related investment. This amount includes $5.2 billion for transit agency
security-related capital investment plus $800 million annually for security-related personnel and
other security-related expenses. The dollar value clearly outlines the need of security systems in
our transit systems across the nation.
The survey also provided information that since 9/11 that more than 88 percent of the survey
respondents have implemented new security measures and 74 percent have increased security
measures that were already in place. The five security-related operating measures that were
ranked as “Very Important” for federal funding were:
•
•
•
•
•
Funding current transit agency/local law enforcement security personnel
Training for security personnel including preparatory drills
Funding additional transit agency/local law enforcement security personnel
Security training for other personnel
Joint transit/law enforcement training including preparatory drills
The five security-related capital investments most often selected as those for which federal
funding is “Very Important” were:
•
•
•
•
•
Radio communications systems including operational control redundancy
Security cameras onboard vehicles
Controlled access to facilities and secure areas
Security cameras in stations
Automated Vehicle Locator systems
In addition, the larger systems with extensive separated right-of-way rail lines and tunnel
networks also rated federal funding for chemical, biological, and radiation detection devices as
very important.
Detection and Deterrence
In the wake of the 9/11 attacks, Congress created the Transportation Security Administration
(TSA) within the U.S. Department of Transportation. TSA was explicitly given the responsibility
for security in all modes of transportation and for the development of policies, strategies, and
plans for addressing transportation security threats. TSA is working on standardizing the security
measures across the different mode of transportation. “Deterrence, Protection, and
Preparation: The New Transportation Imperative Study” (TRB 2002) reviews the
FTA-FL-26-71054-03
19
characteristics of public transportation systems in details and gives recommendations related to
strategic planning and research for effective working of TSA. The report recommends that
security technologies should be carefully selected based on the characteristics of the public
transportation system and transportation security. Transportation Security can best be achieved
through coherent security systems that are well integrated with transportation operations. The
systems should be deliberately designed to deter terrorists even as they selectively guard against
and prepare for terrorist attacks. Layered security systems, characterized by an interleaved and
concentric set of security features, have the greatest potential to deter and protect. Since the
security system overlap with each other, it cannot be breached by the defeat of a single security
feature. Increased sense of safety and security certainly increases the confidence in the riders
thus affecting ridership positively. The study proposes the use of already existing security
devices and enhancing its utility by adding new technologies that complements the already
existing ones. This approach capitalizes on existing processes and capabilities and it makes sense
given the potential cost and magnitude of the security task in the evolving and expansive
transportation sector.
The Transit Cooperative Research Program (TCRP) has done a number of studies to understand
on the use of technology and their effectiveness for improving transit system security.
Technology plays an important role in improving security at transit systems but there is a need to
evaluate and understand the implications of its use under various scenarios. Modern technologies
not only require high expertise to setup but also have high implementation costs. The
“Guidebook for Selecting Appropriate Systems for Small Urban and Rural Public Transportation
Operators” (TCRP Report 76, 2002) developed guidelines to help transit agencies identify
technologies appropriate for their system size and needs. Some of the grants and available
revenue for funding these security measures are also explored in the report. In general it offers
assistance to transit systems for developing an implementation plan, conducting the procurement
process, and installing the new technology system.
“Applicability of Portable Explosive Detection Devices [EDDs] in Transit Environments”
(TCRP Report 86, 2004) demonstrates the capabilities explosive detection devices that exist in a
transit environment, including subways and bus station platforms. Most portable detection
equipment was designed for airport security and was focused on finding modern plastic
explosives that can create significant damage, even in small quantities. But now, there are a
number of current and emerging technologies that are suitable for portable instrumentation for
explosives detection applicable to transit industry. The study addresses three areas of expertise:
•
•
•
an in-depth understanding of transit operations and how EDDs can be used effectively
without interfering with efficient operations
scientific and technical expertise in the deployment and operation of portable EDDs
knowledge and experience in conducting field operational tests to assess the efficacy of
available portable EDDs in transit settings.
In this report, selected EDDs were tested in the transit environment, and the use of these devices
to check suspicious packages was evaluated. A variety of transit and geographical environments
were used in these tests. These devices were tested to understand the ease of use because the
intended operators would be transit security personnel, not explosive ordnance disposal (EOD)
FTA-FL-26-71054-03
20
units. The technologies discussed are Ion Mobility Spectrometry (IMS), Surface Acoustic Wave
(SAW), Electron Capture Detectors, Thermo-Redox Detectors, Amplifying Fluorescent Polymer
and Canine.
In the decision-making process for transit agencies considering the deployment of portable
EDDs, the acquisition, installation, training, operations, and maintenance costs associated with
these devices are important factors. The costs associated with the tested EDD in the research are
outlined in the report and they are further broken down into the device’s major components and
their respective lifetimes. This would help the transit agencies to understand the cost associated
with implementing the technology. In addition, this report makes recommendations for
improvement or adaptation of the devices to the transit environment, discusses the cost of
implementing and maintaining the instruments, and includes a comparison of portable detectors
and canines.
“Intrusion Detection for Public Facilities Handbook” (TCRP Report 86, 2003) provides
comprehensive information on application and implementation of a wide range of Intrusion
Detection Systems (IDS) technologies to include in public facilities: Fencing Systems, Barrier
Systems, Lighting Systems, Video Systems, Access Control Systems, Sensor Systems,
Identification Systems, Data Fusion, Display and Control Systems, Crisis Management Software,
and a number of other systems. Intrusion Detection Systems (IDS) define, observe, control, and
sense entry into a defined controlled or secure area and Access Control Systems (ACS) manage
various combinations of entry, exit and/or movement through secure and controlled areas by the
use of an identifiable token. Many transit systems are already using a variety of intrusion
detection strategies. Initially, the strategies for deploying IDS and ACS were employed to reduce
hazards, vandalism and crime; restrict access to secure areas; and raise passenger-perceived
levels of security when using the transit system. But now IDS and ACS are now effectively
deployed to detect and prevent the transit systems from terrorism. In this study, a handbook was
developed for selecting and managing intrusion detection systems in the public transportation
environment.
The handbook also addresses transit agencies’ needs for evaluating and upgrading the intrusion
detection systems applicable to the spectrum of their facilities. It provides guidance on assessing
system needs; developing system designs; and estimating system costs, benefits, and risks. IDS
and ACS discussed in the Handbook range from low-technology to more complex hightechnology systems, and directly support the deterrence and detection of intrusion into secure
areas. In this handbook, ACS are a subsystem that support IDS by enabling access by authorized
personnel, preventing access by intruders, and interfacing with IDS to annunciate entry into
controlled or secure areas. ACS covers the spectrum from simple keys to highly integrated
biometrics controls. Since there are no specific ACS requirements or standards for transit
facilities, examples and references are provided from other industries that can be applicable to
transit systems. The handbook contains a survey list used to quantify and qualify the ACS. It also
provides guidance on the type of questions and issues to be considered in the selection process
for a capable, respected and reputable company that can provide the required security solutions.
“Robotic Devices: A Guide for the Transit Environment, Public Transit Security” (TCRP
Report 86, 2003) looks at unmanned tele-operated robotic vehicles and they can be used in
FTA-FL-26-71054-03
21
transit. Tele-operated robotic vehicles have raised public awareness with successful use of this
device for search and rescue efforts following the 9/11 disaster. Robots have long been used in
search efforts and homeland security missions such as explosive ordnance detection and
disposal, perpetrator location and observation, and similar military applications. Their major
strength of interrogating areas impenetrable by humans while keeping their human operators out
of harm’s way is now being realized and is being applied to transit systems. The environments
for their applications are discussed in the report. These environments discussed are categorized
as “Structures,” “Vehicles,” “Roadways and Terrain,” “Weather Conditions,” “Optical
Navigation Environments,” “Radio Environments,” “Hazardous Environments,” and “Other
Requirements.” Both normal conditions and hazardous situations are examined in the study.
Robot systems include a wide variety of remotely controlled vehicles equipped with cameras,
sensors, and other navigational instruments to provide feedback to the user at a control station.
Payloads can include additional sensors such as X-ray cameras; nuclear, biological, and chemical
hazard detectors; bomb disarming devices; weaponry; and a variety of other deployable systems
such as medical supplies. The report gives recommendation to the transit agencies in the
appropriate selection of such devices for various transit scenarios.
“Electronic Surveillance Technology on Transit Vehicles, A Synthesis of Transit Practice”
(TCRP Synthesis 38, 2001) compiles information for on-board vehicle surveillance technologies
and transit agencies experiences in the application of those technologies. All the current and
emerging technologies designed for use in the transit industry are reviewed. There has been
considerable improvement in technologies for on-board vehicle surveillance since 2001, but this
synthesis provides an extensive overview of its benefits and issues with the use of surveillance
technologies.
This review of the literature illustrates it is become relatively easy to develop layered security
system for a transit systems. From this review a number of research studies have been identified
to help transit agencies develop security and safety plans, assess their system’s threats and
vulnerability and new technology has been identified to help make a system safe and secure
Transit Security Reference Resource
The Transit Security Reference Resource Website at www.cutr.usf.edu/security was developed
serve as a valuable resource for all transit professionals throughout the nation. The website
provides available transit security research, resources, publications, literature reviews and a
contact database for transit security reports and organization involved in transit security.
FTA-FL-26-71054-03
22
The website has four categories: Reports, Tools, Best Practices, and Organizations.
The “Reports” tabs contains a number of reports published by FTA, FEMA, FBI, GSA, GAO,
EPA, AFT and other federal agencies.. The Report section also includes reports on security from
APTA, AASHTO, CTAA ,TSI and other organization that have published reports related to
transit security.
FTA-FL-26-71054-03
23
The “Tools” tab provides examples of emergency preparedness plans and emergency response
plans from agencies around the country. These examples are provided as a resource tool to help
transit agencies to develop or improve their security and emergency preparedness program plans.
The “Best Practices” tab contains the case studies in this report and further illustrates the
innovative, cost effective, methods and solutions that transit agencies have implemented to
improve security operating/ maintenance facilities and passenger stations.
The “Organizations” tab provides links to on-line resources, federal government agencies, other
public transportation organizations and think tanks--other national organizations involved in
national security, weapons of mass destruction and chemical, biological, radiological or nuclear
(CBRN) attacks.
FTA-FL-26-71054-03
24
FTA-FL-26-71054-03
25
FTA-FL-26-71054-03
26
CASE STUDIES/BEST PRACTICES
Introduction
The mass transit industry has always been expected to operate efficiently, provide timely,
reliable service, and ensure the safety and security of customers and employees. In the preterrorist society most of these goals were met by our nation’s transit systems efficiently and cost
effectively. However, since September 11, 2001, with the increased onset of terrorism on
international public transit our transit properties are expected to decrease the opportunity for
address potential vulnerabilities with limited funds. At a time when additional operating funds
are no longer available or limited, the transit industry is being asked to provide heightened
security against terrorism.
Open access to public transit facilities and vehicles is the key to increasing ridership but, at the
same time, this open access becomes a challenge when protecting these agencies from possible
attacks. Open access leaves transit agencies highly vulnerability to possible attacks because of:
the number of people, high accessibility during time of day, main and secondary impact, easy
entry and exit, and anonymity.
Highly vulnerable transit centers have a high potential for significant loss to human life and
property damage if proper security measures are not address to somehow manage transit natural
open accessibility. However, investment cost for security measures based on the threat
assessments may be difficult to justify. Other factors should also be considered in determining
the total benefit. Improved security measures have a deep impact on impeding daily general
crime which in turn helps to improve ridership.
Case Studies
Identifying cost effective security methodologies for the transit industry requires an awareness
and familiarity with technology advancements and innovative problem solving. While modern
science has made it possible to come up with extremely accurate devices for enhancing the
security, at the same time, these technologies have high capital, operating and maintenance cost.
How can transit agencies implement cost effective methods to improve security at transit
operating/maintenance facilities and passenger stations without significant increases in their
operating costs? Nationwide, several transit agencies were identified that have successfully
accomplished this task. These agencies have creatively and innovatively incorporated solutions
to increasing transit’s security in a cost-effective manner. The six national transit properties are
listed in Table 6 along with their solution to the perplexing issue of increasing security.
FTA-FL-26-71054-03
27
Table 6. Case Study Locations and Innovative, Cost-Effective Security Measures
Integrated security design criteria
Denver Regional Transit District (RTD)
Washington Metropolitan Area Transit Authority
(WMATA) - District of Columbia
Charlotte Area Transit System (CATS) North Carolina
PROTECTS (Program of Response Options and
Technology Enhancements for Chemical/
Biological Terrorism)
State of the art access control systems, video
surveillance and integrated perimeter security
system
Massachusetts Bay Transportation Authority
(MBTA)
Innovative commander center
Central Florida Regional Transportation Authority
(LYNX) – Orlando
Biometric system to secure its fare counting room,
parameter security and complex firewall design
Bay Area Rapid Transit (BART) – San Francisco
Subway tunnel intrusion security technology
Following this section are six case studies that clearly detail the challenges and accomplishment
of each of these transit agencies to creatively improve transit security. Each agency’s approach
to improving security at their agency varies from simply strategically locating key personnel and
integrating safety and security in pre-construction design to more complex systems such as early
chemical warning systems and intrusion detection devises. All of the case studies provide
detailed responses to each of the categories listed in Table 7.
Table 7. Categories for Case Studies
• Transit Agency Profile and Reason for Selection of Transit Agency
• Problem Identification and Need for Innovative Security Measures
• Previous Attempts (if any) to Address Problems and Results
• Reasons for Proposed Solution
• Solution Proposed/Implementation
• Cost/Benefit Analysis
• Measure Effectiveness of Implementation / Performance Indicators
• Lessons Learned/Conclusion
FTA-FL-26-71054-03
28
Case Study
REGIONAL TRANSPORTATION DISTRICT (RTD)
DENVER, COLORADO
Transit Agency Profile and Reason for Selection of Transit Agency
Overview
The Regional Transportation District (RTD) in Denver is one of a few transit agencies
nationwide that has developed a specific transit-related Design Criteria Manual for its new Light
Rail Transit (LRT) systems. What is specifically significant is that the agency introduced and
integrated both safety and security design requirements into its LRT Design Criteria Manual.
The intent of the LRT Design Criteria Manual is to establish general criteria to be used in the
planning and design phases of newly planned LRT capital improvement projects. One of the
primary goals of the manual is to provide guidance to project engineers and architects for the
initial inclusion of safety and security requirements during the planning and design phases of
RTD’s LRT projects. RTD developed and modified these safety and security design criteria as a
result of lessons learned from earlier LRT projects, safety design criteria from other agencies,
and results from security evaluations and Threat and Vulnerability Assessments (TVA). The
success of this initiative has not only motivated the agency to expand and improve the LRT
Design Criteria Manual for future approved LRT projects, but RTD is now developing new
Design Criteria Manuals to cover future bus operations and facilities and commuter rail capital
improvement projects.
RDT’s Public Safety Division has the responsibility of the agency’s safety and security
requirements. The Public Safety Division is divided into sub-sections that include Safety,
Environmental and Security. The Division has 6 employees, 75 contracted security officers, and
a contract with the Denver Police Department to provide off-duty Police Officer security
assistance.
System Description
The RTD system has evolved into a transit system that services an area of 2,406 square miles,
and includes 41 municipalities in 7 counties. The system has 176 fixed routes, which includes
local bus services along major streets, express and regional bus routes providing non-stop
services along longer distances, Denver International Airport bus service, a free shuttle on the
Sixteenth Street Mall in downtown Denver, and a LRT system service serving Denver and its
southwestern suburbs. Basic operations include the following.
Bus Operations: The bus fleet currently has 1,074 buses, with an average fleet age of 8.1 years.
Eighty-seven buses are leased to private carriers. Annual boardings are now approximately 83
million passengers (279,000 boardings on an average weekday) through a network of over
10,237 bus stops. There are currently six maintenance and storage facilities district-wide, 67
park-n-rides and 17 transfer stations.
FTA-FL-26-71054-03
29
Light Rail Operations: The light rail service operates on the existing 5.3 mile Central Corridor,
the 8.7 mile Southwest Corridor and the 1.8 mile Central Platte Valley Spur. The system
accommodates two lines, the C and D lines. The Southeast Corridor/T-REX design-build
project, adding approximately 19 miles of light rail service, is in construction and will be
operating by November 2006.
Other Services: In addition to the fixed route services, RTD provides services to sporting events
and other special events, special services for the disabled and senior citizens, and door-to-door
services in limited areas of the District.
The population of the Denver metro area grew from 2.1 million in 1995 to more than 2.6 in
million in 2005. Approximately 95 percent of the population of the region lies within the RTD
service area. The area’s rate of population increase peaked in 1999 and decreased steadily
through 2004. While continuing to grow, the region grew at a slower rate. In spite of a five-year
slowing trend, the area is forecast by the Denver Regional Council of Governments to grow to
2.87 million in 2010 and to 3.26 million in 2020, an increase of approximate 25 percent in 15
years.
Climatic Considerations for Systems Design
The Denver metropolitan area, within which RTD operates, is situated at the foot of the eastern
slope of the Rocky Mountains in central Colorado. The area has a semi-arid climate that is
somewhat characteristic of the High Plains but is modified by the Rocky Mountains to the west.
Because of this, Denver lies in a belt where there is a fairly rapid change in climate from the
foothills to the plains. This change is largely caused by the increase in elevation as you travel
west to the foothills. Denver has an elevation of 5,280 feet.
The average annual temperature is about 50°F at this elevation, though this varies a few degrees
as elevation changes. The wide average range in daily temperature of 25° to 30°F in the Denver
metropolitan area and a wide average range in annual temperature are typical for the High Plains.
Temperatures vary from day to day; extremely hot weather in summer and extremely cold
weather in the winter normally do not last long and are followed by much more moderate
temperatures.
System equipment including vehicles, electrification power and distribution system, signal
system and fare collection/validation equipment along with track-work, stations and other civil
features must be capable of maintaining operation within the unique weather and elevation
conditions of the region.
Problem Identification and Need for Innovative Security Measures
In the transit community as a whole, safety and security requirements have tended to be an afterthought in transit capital improvement projects. This has forced transit agencies to address
critical safety and security issues after the projects are designed, during project construction by
means of change orders, or even after project completion. One outcome of this approach is that
agencies must address un-programmed funding requirements for facility, equipment and or
systems changes that could have been avoided if these requirements were initially included.
FTA-FL-26-71054-03
30
Previous Attempts (if any) to Address Problem and Results
RTD originally developed an LRT Design Criteria Manual for the design and construction of its
initial LRT system, the Central Corridor, which opened for revenue service in October 1994.
There have been three subsequent extensions: the Southwest Corridor in 2000, the Central Platte
Valley Spur in 2001, and the Southeast Corridor scheduled to open in November 2006. The LRT
Design Criteria Manual went through a number of revisions prior to the design of each
subsequent corridor, including a significant revision in 2000 which included a new section
dedicated to system safety. The system safety section was originally developed from a
combination of RTD’s System Safety Program Plan (SSPP), Military Standard 882, APTA
guidelines, FTA requirements and recommendations, and a safety criteria model of the Portland,
Oregon transit system. In addition, safety revisions were also incorporated from lessons learned
from previous RDT LRT projects.
In November 2004, the Denver metropolitan area voters approved RTD’s FasTracks program,
consisting of 6 new rail corridors (119 miles total) including commuter rail, LRT, and possibly
Bus Rapid Transit (BRT). To address the ambitious needs of the FasTracks program, the LRT
Design Criteria Manual was again revised in 2005. This revision not only updated the safety
criteria but also introduced security criteria for the first time. RTD developed all of its security
criteria based on their System Security Plan (SSP), RTD requirements, FTA requirements and
recommendations, and as a result of security assessments and Threat and Vulnerability
Assessments (TVA) after the 9/11 terrorist attacks. These assessments were conducted through a
number of avenues, which included in-house efforts using the Department of Justice Threat and
Vulnerability Assessment (TVA) model , FTA (consulting contracts), State of Colorado
Department of Home Land Security (National Guard), and the Transportation Security
Administration’s Surface Transportation Security Inspectors.
As a result of the earlier success with the LRT Design Criteria Manual and the agency’s approval
of the safety and security design criteria, commuter rail and bus transit facilities Design Criteria
Manuals are now under development.
Reason for Proposed Solution
The primary reason for integrating safety and security design criteria in an initial project design
and/or procurement specification is to proactively address these requirements thereby including
them in an initial overall project budget. This could potentially save a transit agency hundreds of
thousands of dollars. In addition, this process can reduce the number of safety and/or security
related project construction and/or procurement change orders, thus preventing potential project
and procurement budget overrun.
Solution Proposed/Implementation
General Implementation
RTD developed and implemented the LRT Design Criteria Manual initiative with the General
Manager and senior management support and approval. This task was accomplished through an
FTA-FL-26-71054-03
31
integrated approach that involved all staff sections of management as well as supervision of the
Executive Safety and Security Committee.
The LRT Design Criteria Manual revision and approval process in 2005 were challenging and
time consuming. RTD convened a group of subject matter experts from engineering,
construction, rail operations, bus operations, planning, facilities maintenance, scheduling, safety
and security. An orientation outlining the process, as well as the goals and objectives of the task
was presented to the participants to standardize the process. Each section of the manual was
assigned to a committee with a lead person responsible for the section revision. Once the
sections were initially revised a draft revision was submitted for review and comment. A
specific process was developed to allow all disciplines to provide comments, and for all
comments to be reviewed and discussed by the entire group for proper disposition of the
comments–a true systems approach. A final draft was then compiled and received a final review
by the senior management from rail operations, engineering, safety and security. The final
document was then approved by signature of senior management. Even though the process was
arduous, a 6-9 month process of meetings and 4 half day workshops, the end result was a
comprehensive document that was well accepted throughout the organization.
The newly-developed commuter rail and bus transit facilities Design Criteria Manuals were
developed in a similar, but not as comprehensive, fashion, primarily because much of the same
design criteria outlined in the LRT Design Criteria Manual carried over to the new manuals.
These two new documents are currently in the final review and approval stages.
Each Design Criteria manual has a section dedicated to system safety and system security.
However, the safety and security section does not capture all the safety and security design
criteria established in the manual. Specific system safety and security design criteria have been
integrated throughout sections that address landscaping, stations, operations facility, fare
collection equipment, and light rail vehicles, to mention a few. The system safety and system
security section of the LRT Design Manual establishes the foundation for safety and security
designs and detailed criteria are captured and integrated throughout the document.
The LRT Design Criteria Manual establishes basic criteria to be used in the design of new RTD
LRT systems. In addition, drafting standards, directive or sample drawings and management
procedures were prepared to standardize and guide the design activities and the preparation of
contract documents.
The safety and security design criteria that were included in revisions to the LRT Design Criteria
Manual addressed emergency access/egress, station design and walkways. The criteria require
the design to identify emergency access and egress locations and provide a list or matrix of the
necessary elements to be provided at each exit, such as lighting, signage, lock hardware,
intrusion detection, and other elements.
FTA-FL-26-71054-03
32
Evans Light Rail Station, one entrance/
exit, in compliance with NFPA 130
Littleton Downtown Light Rail, non exit,
multiple entrances, in compliance with
NFPA 130
In addition, the criteria established the requirement for video surveillance equipment into
capital projects. The Design Manual requires that video surveillance systems be capable of
transmitting real-time (30 frames per second per camera) video to RTD’s Security
Command Center via a fiber optic transmission backbone. The manual requires all designs
to include system elements including communication houses, transmission infrastructure,
color cameras, and digital video recorders. The manual establishes that designs must
incorporate video surveillance covering station platforms, emergency telephones, elevator
waiting areas, stairwell entries, parking structures, pedestrian tunnels and pedestrian
bridges.
Digital
Cameras
Union Station, light rail with no video
surveillance
Littleton Light Rail Station with video
surveillance
FTA-FL-26-71054-03
33
RTD Security Command System Console
camera placements and coverage, Littleton/
Mineral Park-and-Ride
Boeing, Visual Security Operation Console
(VSOC), 3-dimensional geographic
presentation
The LRT Design Criteria Manual also requires the placement of emergency telephones in
the design elements of capital projects. The manual requires that all emergency telephones
be consistent with existing RTD units and meet the performance requirements of RTD’s
existing emergency telephone network. Emergency telephones are required in designs for
all station platforms, elevator waiting areas, stairwell entries, parking structures, park-nrides, pedestrian bridges and tunnels.
Digital
Camera
Emergency
Phone
Union Station, Light Rail
I-25 & Broadway Light Rail Station,
no emergency telephones
Emergency phones being installed
FTA-FL-26-71054-03
34
The manual also addresses the design requirements for parking structures, as well as
underground and/or below grade transit facilities. Stairwell and elevator designs must
maximize the interior visibility of stairwells, elevators and elevator shafts. It also requires
that wall construction materials be transparent, such as glass, and must allow visibility
from at least three sides. For underground, enclosed and/or below grade facilities, it was
recognized that these present unique security challenges. The manual recognizes the
importance of maximizing patron safety and security through various counterterrorism
measures. Specifically, the design elements of these facilities must include the provision
of video surveillance in the perimeter areas, portals, entrances, exits, the interior of the
facilities and all fare vending locations.
University Park-and-Ride, T-Rex Project,
elevators and stairs with no portal protection
Market Street Bus Terminal Entrance
RTD made a simple change top its new bus facility Design Criteria Manual that has proven to be
a significant cost savings. Due to a serious issue with acid etching, graffiti, glass replacement
and general maintenance with their glass panel bus shelters, they changed the design criteria to
have perforated metal sidings instead of glass and a curved shape roof line. These changes have
saved the agency roughly $150,000 in annual maintenance costs with a 3-4 year pay back benefit
with their current inventory of bus stop shelters. All new bus shelter procurements must now be
in compliance with the new design criteria.
Cost/Benefit Analysis
RTD did not conduct a cost/benefit analysis on this design criteria initiative. However, RTD’s
success of integrating safety and security design criteria early in the project planning and design
phases and cost requirements included in the project budget will prove to be a significant longterm cost savings to the agency.
FTA-FL-26-71054-03
35
Old design with glass panels
One of many new design configuretions with perforated metal siding
Measure Effectiveness of Implementation/ Performance Indicators
RTD’s effectiveness in implementing this initiative has been proven by the continued support of
the General Manager and senior management. This includes the success experienced by the
agency’s staff and the Executive Safety and Security Committee accepting this process and
approving the RTD Design Criteria Manual. In addition, just the fact that the agency continues
to update the LRT Design Criteria Manual to remain in compliance with accepted practices and
applicable codes and develop new Design Criteria Manuals for upcoming capital improvement
projects proves that the implementation was successful and effective.
Lessons Learned/Conclusion
•
The initiative of having Design Criteria Manuals with safety and security design criteria
must have senior management’s approval and support.
•
An integrated, horizontal approach with the agency staff is imperative for developing a
comprehensive product such as the LRT Design Criteria Manual and the other Design
Criteria Manuals.
•
A reasonable and practical approach is essential when developing the framework for
identifying specific safety and security design criteria. The difficult part of the process
is establishing the right balance between having the essential safety and security
requirements in accordance with codes and regulations verses having the latest
technology or capability.
•
With the integration of design criteria early in the project, project budget constraints may
be a challenge. This can apply during design review and the project Value Engineering
process. The establishment of this process which approves changes and/or deviations at
FTA-FL-26-71054-03
36
the RTD Executive Safety and Security Committee level has proven extremely
important. This process not only controls changes but can initiate a compromise and/or
elevate an issue to the General Manager level for a final decision on project priorities
and design criteria changes.
•
To ensure the Design Criteria Manual requirements are included in the projected project
costs, a design manual should be given to the engineers and architects as early as the
Alternative Analysis (AA) portion of the project system planning phase. This is the
phase where the initial foundation of the preliminary project budget forecast is
developed and a specific amount is allocated for security requirements.
•
When new safety or security technologies are introduced for consideration, a detailed
analysis is needed to identify desired technological configurations, testing and
monitoring capabilities, training requirements, routine maintenance, management
responsibilities, and long term life cycle costs for sustainability reasons. This analysis
and findings are not only essential for the approval process, but once approved and in
place, it provides sustainable funding requirements that must be integrated into an
agency’s long range budget forecast cycles.
More information on the LRT Design Criteria Manual and specific fact sheets on LRT corridor
projects can be obtained through RTD’s website under “Light Rail” at www.rtd-denver.com/.
FTA-FL-26-71054-03
37
FTA-FL-26-71054-03
38
Case Study
WASHINGTON METROPOLITAN AREA TRANSIT AUTHORITY (WMATA)
DISTRICT OF COLUMBIA
Transit Agency Profile and Reason for Selection of Transit Agency
Overview
WMATA operates the second largest rail system and the fifth largest bus network in the United
States. The agency was created in 1967 by an Interstate Compact. In 1973, four area bus systems
were acquired. In 1976, the first phase of Metrorail began operation and in 2004 the last three
stations were opened. Metrorail and Metrobus serve a population of 3.5 million, within a 1,500
square mile service area. The transit zone consists of the District of Columbia, suburban
Maryland counties of Montgomery and Prince George’s, and the Northern Virginia counties of
Arlington, Fairfax and Loudoun and the cities of Alexandria, Fairfax, and Falls Church. The rail
system begins revenue service at 5 AM and on weekends at 7 AM. The rail system closes at
midnight Sunday to Thursday and on weekends at 3 AM Friday and Saturday.
System Description
Transit service is provided along 350 bus routes and with nearly 1,500 vehicles and a 106-mile
rail system serving 86 stations (DC-38.30 miles, 40 stations; Maryland-38.31 miles, 26 stations;
Virginia-29.47 miles, 20 stations), with over 1,000 rail cars providing nearly 350 million
passenger trips.
WMATA’s Communications Branch is responsible for the efficient, effective and economic
management of the Authority’s communications systems in support of Rail and Bus Operations,
e.g., telephone, mobile radio, public address, cable transmission, fiber optic, fire and intrusion,
rail yard security, closed circuit television (CCTV), bus transfer dispensers, wayside/emergency
telephones, environmental monitoring, digital video recorders, and the PROTECT system.
Metrobus, Metrorail and Paratransit
Rail Service
• 198 million passenger trips projected in FY06
• 68 million miles of service projected in FY06
Bus Service
• 149 million passenger trips projected in FY06
• 48 million miles of service projected in FY06
Paratransit
• 310-vehicle paratransit fleet, operating over 1.45 million trips annually
Office of MetroAccess Services
• Mobility for people with disabilities in coordination with WMATA service
area and ADA programs
• 310 vehicle fleet (76 sedans and 234 Vans)
FTA-FL-26-71054-03
39
•
•
145 million annual passenger trips
6,500 trips scheduled daily
The Department of Rail Services
The Department of Rail Services is responsible for ensuring train safety, on-time service and
reliable transportation for customers. With a staff of approximately 5,600 employees, Rail
Services operates and maintains 950 rail cars and their components, which travel over 64.4
million miles each year and responds to all customer calls and correspondence. In addition, Rail
Services operates and maintains:
•
•
•
•
•
•
•
•
•
•
•
86 rail stations
2,129 pieces of fare collection equipment
313 parking gates
206 miles of track in revenue service and 38 miles of track in yards
Automatic Train Control systems
ventilation and fan shafts in tunnels that remove smoke
emergency call boxes
train intercoms
fire panels in every station
water system for tunnels and stations (fire suppression)
58,148 park and ride spaces at 20 garages and 35 surface lots (50,000 customers
per day), 44 stations with “Kiss and Ride”
Major assets of the Department of Rail Services include:
•
•
•
•
•
•
97 traction power substations and 110 tie breaker stations
176 AC substations and 1655 emergency trip stations
317 UPS systems, 30 emergency generators, 317 battery banks, 7,205 relays, 250
miles of track feeder cables, 306 HV breakers, and 207 HV transformers
Power and lights for 11 bus garages, 86 passenger stations, 37 parking lots, 11
parking garages and 6 service and inspection buildings
247,000 lights
Landscaping services for approximately 550 acres of grounds, and cleaning and
repair services for 850 acres of pavement
•
The Department of Rail Services operates and maintains:
• 323 tunnel standpipe systems (100 miles of piping)
• 493 fire suppression systems (wet sprinkler, dry sprinkler, deluge and halon
systems)
• 108 vent shafts
• 79 fan shafts
• 113 tunnel emergency exits
The Department of Rail Services has approximately 700,000 weekday customers and provides
service for 80 baseball games, 8 football (Redskins) games, over 120 MCI events, malls, and the
Cherry Blossom Festival events during the year.
FTA-FL-26-71054-03
40
Department of Bus Service
The Department of Bus Service is responsible for ensuring that bus service is safe, reliable, and
clean for its customers. The 3,625 WMATA Bus Service employees::
•
•
•
•
•
•
operate and maintain 340 bus routes that travel 48,243,600 miles annually
transport 132.3 million passengers annually
average 444,000 weekday passengers
operate and maintain 10 garages
operate and maintain 2 shops
operate and maintain 1,477 buses, ranging in size from 26 to 60 feet
Metro Transit Police Department
The purpose of the Metro Transit Police (MTP) is to prevent crime; protect Metro’s customers,
employees, facilities and revenues; and enforce laws, ordinances, rules and regulations. MTP
officers have jurisdiction and arrest powers throughout the 1,500 square mile Transit Zone that
includes Maryland, Virginia, and the District of Columbia for crimes that occur on or against
Transit Authority facilities. They are nationally accredited through the Commission on
Accreditation for Law Enforcement, Inc.
MTP conducts annual counter-terrorism training and explosive device training, provides bomb
containment trash cans, participates in numerous interagency disaster-related drills, has 1,400
cameras monitoring the rail system, and participates in the testing of emergency technology.
WMATA’s Emergency Response Training Facility is the only transit facility of its kind in the
nation that is available 24 hours per day, seven days a week to train emergency personnel. The
facility includes a mock train tunnel that allows regional emergency responders to train for
disasters such as smoke/fire, collisions and potential terrorist incidents in a transit/tunnel
environment. WMATA’s emergency management team trains an estimated 2,000 federal, state
and local emergency personnel each year. MPT’s personnel include:
•
•
•
•
422 sworn transit police officers
102 special police officers
4 revenue guards
23 support staff
Duties and responsibilities of the Metro Transit Police include:
•
•
•
•
•
•
Public safety and law enforcement
Maintain peace and order
Prevent crime and acts of terrorism
Protect transit facilities and revenue
Partner with regional public service and law enforcement agencies
Enforce federal, state and local laws and ordinances
FTA-FL-26-71054-03
41
Responsibilities of the Metrobus Enforcement Division include:
•
•
•
•
•
•
•
•
Patrolling buses in all three jurisdictions
Investigating offenses that occur on buses, conduct follow-ups
Investigating internal theft that occurs on bus properties
Conducting terrorism awareness training for bus personnel
Attending monthly safety meetings at each bus division
Tracking data obtained from the Bus Operator Contact Program
Participating in targeted enforcement initiatives
Visiting local schools and establish mentoring programs
Problem Identification and Need for Innovative Security Measures
A terrorist attack on WMATA would have dramatic implications for our country and our
transportation systems. Brian Jenkins, Director of the National Transportation Center stated, “If
terrorists are determined to kill in quantity and willing to kill indiscriminately, then public
surface transportation systems represent an ideal target.” Subways and buses are proven targets
around the world. In public surface transportation systems, terrorists can attack anonymously
and escape before being detected. Mass transit attracts crowds and gathers them in a contained
environment—nearly 700,000 patrons travel on the WMATA system on an average day.
•
•
•
•
•
Almost half of Metrorail’s peak period riders (47%) are federal employees
More than 50 federal agencies or employment centers are located adjacent to Metro
stations
More than 22 million people visit the nation’s capital annually
Hundreds of thousands of people use Metro to attend major national events such as
Presidential inaugurations and Independence Day celebrations
Federal and regional emergency evacuation plans rely heavily on the Metro (on 9/11,
Metro calmly and successfully evacuated hundreds of thousands of people)
Previous Attempts to Address Problems and Results
Information on previous attempts was unavailable.
FTA-FL-26-71054-03
42
Reasons for Proposed Solutions
WMATA took the lead nationwide in developing plans and procedures for response and
mitigation of a terrorist incident involving the use of weapons of mass destruction (WMD). After
the sarin attack in Tokyo in 1995, WMATA analyzed the devastation and economic
consequences that a chemical attack on mass transportation would have to the United States and
began working with the region and the federal government to ensure that it was well-prepared to
respond to any emergency or catastrophic event.
WMATA examined the Japanese experience in dealing with the Aum Shinrikyo cult attacks
against the Teito Rapid Transit Authority (TRTA) in 1995. Few other counties have faced such
a sustained chemical campaign of violence. The attacks included the following:
•
•
•
•
•
1995-fumes sicken 11 people in a subway train car in Yokohama, March 5
1995-sarin attack on 5 trains, on three train lines, 19 stations affected, with 12
fatalities, and 5,500 injured, Tokyo
1995-400 people injured by fumes released in railway system in Yokohama, April 19
1995-25 people overcome by fumes in a store near Yokohama station, April 21
1995-toxic hydrocyanic gas-releasing devices found in a subway station men’s room,
Tokyo, May 5
The importance of detectors can be highlighted by the
fact that the Tokyo March 20 sarin attack took place in
less than 10 minutes; 16 stations were affected. Hundreds
of people spilled onto platforms coughing blood. Twelve
persons died, and more than 5,000 people sought
treatment at hospitals. More than 130 first responders
were injured, not knowing that it was a chemical attack.
What saved people was not first responders or transit
personnel but the poor quality of the chemical agent and
the dispersal system used by the terrorists.
The transit industry became aware of how vulnerable
transportation was to terrorism. No longer could transit
rely on first responders to rush in and immediately save lives and recover from the incident.
Without training, detection equipment, communications, personnel protective clothing,
hazardous material, and decontamination procedures, the responders would also be victims.
WMATA recognized the need for real-time protection against subway attacks. If an attack took
place, a system would be needed to automatically alert the transportation agency of a chemical
release.
FTA-FL-26-71054-03
43
Solutions Proposed/Implementation
Enhancements by WMATA to increase the life-safety of employees and customers include:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Placement of up to 300 explosion-resistant trash cans in the rail system (started 09/26/05)
Increased presence of transit police officers and K-9 units throughout the system
Digital message boards in the stations that can be used for system alerts
Automated electronic fire protection system in stations and tunnels
Call boxes spaced 800 feet (244 meters) along tracks
Fire extinguishers on platforms and inside rail cars
Video monitoring of stations, elevators and some station parking lots
Public address systems on the trains and platforms
Passenger-to-station-manager intercoms on platforms, in elevators and landings
Passenger-to-operator intercoms inside rail cars—one at each end
Chemical sensors in underground stations (research and development in chemical
detection was enhanced after the Tokyo sarin attack).
Establishment of an interagency agreement with all area fire departments
Relocated all newspaper vending machines, trash receptacles, and recycling bins to
station entrances/exits
Moved bicycle lockers away from station underpasses
Formalized procedures for handling hazardous materials
Request of $190 million in funding from the federal government for a variety of security
improvements and programs
Conduct of daily inspections of equipment and facilities
Assurance that employees are knowledgeable about safety procedures
A new emergency preparedness page on WMATA’s web site
(http://www.wmata.com/riding/safety/emergency_preparedness.cfm) linking to safety
and security brochures and press releases and to external sites including the Office of
Personnel Management's Emergency Guidance, American Red Cross Community
Disaster Education materials, the U.S. Department of Homeland Security and emergency
preparedness sites for Virginia, Maryland and the District of Columbia
Testing and acquiring the latest safety technology to prepare for emergencies is necessary
for life safety
In addition to the other proposed solutions, PROTECT (Program for the Response Options and
Technology Enhancements for Chemical/Biological Terrorism) was started in 1998, a joint effort
among the Federal Transit Administration, the National Institute of Justice, the Department of
Energy, and the Washington Metropolitan Area Transit Authority, as a result of the chemical
attack in Tokyo in 1995. PROTECT was developed by Argonne's Decision and Information
Sciences Division, Sandia, and Lawrence Livermore National Laboratories.
The PROTECT system is an early-warning system that is helping protect WMATA from the
threat of chemical attacks by terrorists. It is installed in the Metro subway system and provides
early warnings for commuters in the nation's capitol and quick-response capability to emergency
first-responders. It is the first and only systems-based application developed to address the
complexities of planning and testing emergency responses by multiple agencies, disciplines and
FTA-FL-26-71054-03
44
jurisdictions. PROTECT incorporates software originally designed to evaluate ventilation
alternatives in extreme pressure, humidity and temperature as the trains move throughout the
system, and to model emergency ventilation systems efficiency in fire or smoke. The software
can also be used as a planning and simulation tool.
The program supports the development of any number of emergency plans, from hurricanes,
tornados, forest fires, chemical spills, etc., to any type of homeland defense emergency scenario.
It is the first systems-based application developed to address the complex problem of planning
and integrating responses to emergencies, particularly those involving different teams or
agencies.
Lead scientist Anthony Policastro, PROTECT’s program manager from Argonne National
Laboratory, found in tests using smoke that the moving trains pose the greatest risk. Subway cars
can carry chemicals from station to station. But the trains, in particular act as plungers that pump
chemicals through the subway tunnels and through vents, onto the streets above.
The PROTECT system includes detectors that sense chemical agents, video for incident
verification, a computer program to model the spread of contamination in the subway, aboveground flow modeling for dispersion of toxic materials from street vents and station exits and
wireless communication for emergency responders. When PROTECT is triggered, video
cameras verify the attack, alarms sound at the subway operation command center, and operators
are directed through a set of optimized responses shown on computer screens (e.g., photos,
facility maps, identification of the chemical agent and concentration, technical updates and
response procedures, weather and wind direction.)
This system (Argonne’s Chemical/Biological agent Emergency Management Information
System) provides immediate response protocols that vary depending on the amount and toxicity
of the chemical released. Police, fire and hazardous materials personnel are also informed what is
happening and where through a wireless communication system.
According to Peter Mottur, LiveWave’s CEO, ‘The whole automated system not only alerts first
responders but it also gives them the location and procedures to follow.’ PROTECT also
estimates which stations and trains are contaminated and predict whether contamination is likely
to spread to the street. Additionally, by having wireless access to video from underground,
emergency personnel can make decisions on how to execute rescues safely from above ground,
estimating the number of victims and conduct a video search for secondary devices that might
endanger responding rescuers.
PROTECT’s system of chemical sniffers, computers, and TV cameras is no longer an
experiment. It is an automated, 24-hour sentinel, judged reliable enough that, if it goes off,
subway operators will "red light" trains across the nation's capital and evacuate passengers.
Drills show the system cuts response times from 35 to 5 minutes, a critical difference since sarin
and most other chemical agents pose increasing health risk with time and dose. If the system
alarms, police and firefighters are trained to arrive with protective gear, and Metro officials will
keep street vents closed so that first responders have safe zones above ground to evacuate
passengers.
FTA-FL-26-71054-03
45
“Every minute counts," said Susanna Gordon, a Sandia National Laboratories physicist in
Livermore, who worked on the PROTECT system. "If you can get people out of there a few
minutes quicker, you can save a lot of lives.”
Argonne outlined a process for responding to a chemical release on the system and WMATA
prepared the response procedure document. Argonne’s guidance document is aimed at assisting
rail transit managers in developing Standard Operating Procedures (SOP/s) for their systems.
The SOP recommends the response steps that should be taken by the transit personnel at the time
of the incident, in order to contain the incident and minimize casualties.
The guidance in the SOP basically follows two steps. The first involves information gathering
and decision making as to whether protective actions are needed. The second step involves
following a set of pre-determined actions to handle the threat if the results of the first step
indicate further action is needed.
Special areas covered in the SOP include:
• Methods to help prevent an unknown substance incident
• How to identify an incident that requires protective action
• The best means of responding that leads to no or minimal spread of the unknown toxic
material
• Identifying who should be called for assistance
• Notification procedures for WMATA staff and local and federal agencies
• Understanding of the Center for Disease Control and Prevention guidance on powders
and unknown substances
Recommended guidance covers actions to be taken by the Operations Control Center, train
operators, station managers, and supporting police officers. The transit system manager needs to
make choices in adopting SOPs that are transit specific for the system, based on the principles
presented in the general guidance since no one SOP can fully cover all systems.
Training for the PROTECT system was provided to both WMATA and the Fire Department both
on site and off site, utilizing individual training and train-the-trainer training. Personnel that were
trained in the PROTECT system, were taught on a need-to-know basis. All WMATA personnel
had to be given awareness training on the response to a chemical alarm.
Cost/Benefit Analysis
Costs related to the installation of PROTECT were funded by the federal government and
maintenance costs are paid by WMATA. The cost of installing and testing detectors in two
stations linked by fiber optics to PROTECT computers in Metro’s command center was nearly
$7.5 million. A total of $15 million was obtained directly from Congress for additional station
coverage. Each chemical sensor unit cost between $15,000 and $25,000. The cost of maintaining
of PROTECT can be estimated at 8-10 percent of the cost of purchase. Since the cost of
equipment and peripherals was borne by the federal government, and installation and training
was performed by national laboratories or outsourced by the national laboratories, no guarantees
FTA-FL-26-71054-03
46
and/or warranties were needed. Argonne National Laboratory continues to assist WMATA in
support of PROTECT’s CB-EMIS.
There will always be false positives that a chemical incident is taking place if precautions are not
taken. The transportation agency has to identify all agents being used in their system and their
chemical composition, e.g., paint, cleaning agents, and any materials impregnated with a solvent,
etc. The sensors have to be refurbished and filters replaced quarterly. Testing is being conducted
on sensors to extend this to one year.
Measure Effectiveness of Implementation/Performance Indicators
Chief Polly L. Hanson, Metro Transit Police Department, stated before the House Committee on
Home Land Security subcommittee on Emergency Preparedness, Science and Technology on
July 2005:
As the largest transit provider for the National Capital Region, Metro takes its
responsibility in homeland security with the seriousness it demands. WMATA’s
approach to transit security involves a partnership between employees, customers, the
transit police and other public safety departments in the region, and the federal
government. Our training initiatives designed to enhance both WMATA and the
region’s emergency preparedness reflect these partnerships . . . .
WMATA continues to serve as a test-bed for the federal government and model for
the country on new transit security initiatives. Metro’s chemical detector system,
commonly referred to as “PROTECT,” has become a model for other transit agencies
across the nation and around the world. The early warning data flowing from
PROTECT is fully integrated into our Operations Control Center and the data and
live images can also be accessed at safe zones for use by incident commanders in the
region responsible for responding to an event. Federal partners who worked with
WMATA in the development of the PROTECT system include the Departments of
Justice, Energy, Transportation and Homeland Security. Working with our federal
partners, WMATA continues to offer training and technical assistance on the
PROTECT system to interested transit systems in the United States and around the
world. WMATA is actively engaging the Department of Homeland Security in efforts
to leverage the advances obtained by the PROTECT program to other emerging
applications in the chemical, biological and explosive detection areas.
Lessons Learned/Conclusion
The use of weapons of mass destruction in an attack on a subway system occurred in 1995 in
Tokyo and can happen again. It is imperative that subway systems such as WMATA plan for a
response to a chemical incident. The potential for casualties during an incident ranges from
hundreds to thousands depending upon the competency of the terrorist organization in
developing the weapon, the dispersal system they use and the number of potential victims. The
light security in a subway system and the confined nature of the system with large numbers of
people make a subway an attractive target.
FTA-FL-26-71054-03
47
It is impossible to eliminate all vulnerabilities in an open society but we can plan, identify
equipment, personnel that are needed, and the training programs necessary for personnel on site
or responding to a chemical incident. Some areas that require additional attention for
transportation agencies that are implementing chemical detection are:
•
•
•
•
•
•
•
•
•
Higher quality cameras for surveillance systems (old cameras degrade over time)
Cameras with pan, tilt, and zoom
Cameras that can operate from the OCC, not just from the station kiosk
Cameras that have recording capability
Improved radio reception (no dead spots)
Expanded radio coverage may need to be expanded
The need for prognostic hazard zone predictions
Improved notification/communication–important information is passed on to the first
responders as quickly as possible
Improved station lighting
Preplanning for a chemical attack requires that agencies understand that resources and training
have to be allocated, agency plans and procedures have to be current and applicable,
communication protocols have to be established, response mechanisms and interagency
agreements need to be implemented, and jurisdictional issues have to be agreed upon.
WMATA worked with Argonne National Laboratory and various federal agencies to develop a
system to detect the release of chemical agents, trained WMATA personnel and first responders,
rewrote procedures for response and notification, reduced response time, and enhanced the lifesafety of employees and customers.
FTA-FL-26-71054-03
48
Case Study
CHARLOTTE AREA TRANSIT SYSTEM (CATS)
CHARLOTTE, NORTH CAROLINA
Transit Agency Profile and Reason for Selection of Transit Agency
Overview
The Charlotte Area Transit System (CATS) in North Carolina is one of a few transit systems that
has implemented strong security management measures, including security management and life
safety systems integration aimed at protecting passengers, employees, the general public, and
CATS’ physical assets.
CATS is a multi-modal public transit agency that offers fixed route bus, community circulator,
demand response (paratransit /special transportation service), trolley bus, vanpool, historic
trolley (rail) and light rail (under construction, at the time of this study). CATS is a department
and Key Business Unit within the City of Charlotte, headed by the Chief Executive Officer of the
Charlotte Area Transit System/Director of Public Transit. The transit agency is governed by the
Metropolitan Transit Commission. CATS currently serves Mecklenburg County, including
Charlotte, Davidson, Huntersville, Cornelius, Matthews, Pineville, Mint Hill, Concord in
Cabarrus County, Gastonia in Gaston County, Mooresville in Iredell County, Monroe in Union
County, Lincoln County, and Rock Hill in York County, South Carolina. CATS’ service area
population is approximately 800,000.
System Description
Bus Operations: CATS operates 277 buses for peak service daily over 68 routes, 33 local fixed
routes, 18 express routes, 15 community circulator routes, 3 downtown circulators, and 5 route
deviation shuttles. The total bus fleet consists of 326 buses. CATS’ bus service operates out of
two major bus facilities, the South Tryon Bus Garage and the Davidson Street Bus Garage. The
Charlotte Transit Center CATS’ Transportation Center is located in Uptown Charlotte and serves
as a transfer hub for 31 fixed routes and 18 express routes. CATS also serves three transit
centers and has broken ground to build two more major transit centers. Approximately 212
shelters have been installed in commercial and residential areas throughout the service area.
CATS’ bus service operates approximately 20 hours per weekday. Weekday boardings are
approximately 60,000. CATS’ ridership has increased steadily over the past five years.
Rail Operations: The historic trolley service, which is under service suspension allowing for
construction of the new south corridor light rail line, consists of four historic trolley vehicles that
are operated over approximately two miles of track. The new South Corridor Light Rail line is
scheduled to open in October 2007 and will consist of 16 light rail vehicles that will operate
daily over approximately 10 miles of double track, from the uptown area to I-485 and South
Boulevard in Pineville. A new rail maintenance facility is currently under construction and will
open the first quarter of 2007. An extension of the South Corridor line is already in
development, along with a commuter rail and streetcar line.
FTA-FL-26-71054-03
49
Other Services: CATS fleet also includes 90 paratransit/special transportation vehicles providing
demand response service targeted for the disabled customers throughout the region.
Staffing: CATS cumulatively has over 1,000 employees, including approximately 700
contracted staff, through Transit Management of Charlotte (TMOC).
Review the Security and Safety Emergency Plan (SSPP, SSP, CEP):
Reason for Selection
The Charlotte Area Transit System (CATS) has established an Office of Safety and Security,
headed by the General Manager of Safety & Security, utilizing a Charlotte Mecklenburg Police
Department – Transit Police Unit, “Off-Duty” Police, and contract security agencies. The
General Manager of Safety and Security reports directly to the Chief Operating Officer of CATS
but has corporate level oversight.
The Office of Safety & Security staff consists of the General Manager and:
• Administrative Officer
• Charlotte Mecklenburg Police Sergeant – Transit Police Liaison Unit
• Charlotte Mecklenburg Police Officer - Transit Police Liaison Unit
• two additional officers will be added in July 2006 and six officers in July 2007
• Manager of Safety – Bus
• Manager of Safety – Rail
o four – Safety Training Coordinators
o two Safety Specialist will be added in July 2006
• Contract Security Service, 24 fulltime Security Officers
o “Off-Duty” sworn law enforcement officers (approximately 10,000 hours
annually) to provide supplemental security at the Uptown Transit Center and
ride on-board buses
o five Fare Inspectors to be hired in July 2007
The Office of Safety and Security is currently drafting a formal “Policing Plan” that will likely
utilize “Company Police Officers” in lieu of private security guards. CATS anticipates
utilization of 32 full-time sworn Company Police Officers, posted at the Charlotte Transit
Center, future Eastland Mall and Rosa Parks Transit Center and at their bus and rail garages.
These officers will be contract sworn law enforcement officers under the North Carolina Statutes
and will enjoy full police powers, including arrest authority while on Charlotte Area Transit
System property. CATS will continue to utilize the Charlotte Mecklenburg Police Department
Transit Officers to complement the unit. Also, five fare inspectors will be hired to enforce the
“Proof of Payment” system when the light rail line opens. In addition to system security, the
Office of Safety & Security is responsible for system safety and bus and rail operator training.
CATS has a System Security Plan, signed by the Chief Executive Officer, that focuses on the
overall system security effort and addresses how security is integrated into every aspect of the
agency. Currently, the General Manager of Safety & Security is revising the July 2004 edition of
the System Security Plan to include the current efforts and level of security integration. It will
FTA-FL-26-71054-03
50
also discuss and reference the CATS Policing Plan. This plan will also address the various New
Starts projects.
The CATS System Safety Program Plan (SSPP) is also under revision to include the various
corridor projects and system growth that CATS has experienced. Due to the revised 49 CFR 659
and the increase in staff and agency reorganization, the SSPP needs to be updated and republished.
The CATS Emergency Response Plan, which addresses various agency roles and responsibilities
in the event of an emergency, is in place and has been tested during recent drills and events.
CATS has an excellent working relationship with the various public safety entities in the area,
including police, fire, EMS, emergency management, transportation, etc. CATS also has a wellestablished relationship with the Department of Homeland Security and the Transportation
Security Administration, Surface Transportation Section.
Problem Identification and Need for Innovative Security Measures
Prior the CATS becoming a department and a “Key Business Unit,” public transportation was a
division of another department. CATS became a Key Business Unit in 1999, after passage of a
0.5 percent sales tax and chartering of the Metropolitan Transit Commission. As CATS
developed and the organization continued to grow, it was decided to establish corporate level
fulltime Safety & Security Section in 2005. Prior to this time, the safety staff reported within the
Bus Operations Division and focused primarily on operator training and accident review. During
this time, one full-time police officer was assigned to CATS as the Transit Liaison unit. In
August 2004, a full-time Transit Safety & Security Manager was hired to bring the safety and
security function under the corporate level umbrella. The initial charge was to review the
existing safety and security plans and revise as necessary these plans, policies and procedures.
In addition, the manager was to transition the bus operations staff into the Charlotte Area Transit
System Office of Safety & Security and a Manager of Safety – Rail. The task of defining and
developing safety and security standards for the agency was also ongoing. It was determined
that, although the safety and security culture was present, the absence of security systems
integration was obvious and problematic.
According to E. Winters Mabry, MD, Director, Mecklenburg County Homeland Security Office,
as quoted in The Rhinoceros Times Charlotte on Thursday, March 09, 2006:
Charlotte is heightened risk for several reasons. One, Charlotte is the second largest
financial center in the country, we area also the only city that has two major nuclear
power plants within twenty-five miles of the center of town, and finally, because we
are a major transportation hub for rail and highways, we have numerous tankers of
dangerous chemicals and other hazardous materials moving through the area at any
time of the day and night.
Considering CATS’ long-term development plan, anticipated growth, opening of the South
Tryon Bus Garage in April 2005 (a $43M facility), construction of the rail facility, and the
potential for risk within the system, CATS decided that the time was right to implement state-ofFTA-FL-26-71054-03
51
the-art security management practices from the ground floor. The security plan required
integration of security and life safety systems, including access control, facility video cameras,
fire detection and alarm systems, key and lock hardware, incident management, and emergency
call boxes. The old system did not allow for such things as a “one card credential” and remote
monitoring and control. CATS management desired one card that functioned as a unique
employee identification badge and a key card, that would function at any CATS operated facility,
with programmed permissions and schedules, based on an employee’s jobs duties and need for
access.
CATS reviewed the safety and security measures other transit agencies had implemented and
desired to have at least the same affect, but with full system integration. This included
interfacing the access control, fire alarm and video systems with one operating platform.
Installing physical door locks and padlocks with an established restricted patented high security
key way and key management software for control and tracking. CATS security staff continue to
monitor security technology for shelter lighting, wireless on-board video surveillance, and the
option of a third party remotely performing “camera patrols” at designated intervals of time, e.g.
every 30 minutes, depending on the circumstances and events.
These changes did not come without concern from the employees. Prior to the opening of the
South Tryon Garage, with the new security applications, employees had relatively unrestricted
access to all areas of the facility, all of the time. Some employees stated that they felt like “Big
Brother was watching,” and CATS management had to convince them that the security systems
were for their own protection as well as the agency and its assets. Most employees have now
adapted to the changes and the security systems appear to be widely accepted.
For the Office of Safety & Security staff to stay abreast of security activities and developments
within the U.S. and other countries, staff continually monitor daily reports from the FTA,
DHS/TSA, and other law enforcement agencies. Staff participate in the DHS/FTA Safety and
Security Directors/Chiefs Roundtable to help ensure a good networking relationship with peers
and colleagues.
Previous Attempts to Address Problem and Results
Prior to establishing the CATS Office of Safety & Security, other than the bus on-board camera
system, security hardware and systems were standard “low bid,” due to basic open specifications.
These systems did not provide the level of security management that CATS desired. Hence,
CATS looked at various security management systems to provide for future expansion, including
networking, hardware (card readers, inputs, outputs, etc) and full developer support. For access
control, CATS decided to install the Andover Controls Continuum Cyberstation (ACC) operating
platform for its security management. The fire system is the SimplexGrinnell 4100U, which
fully integrates into the ACC.
FTA-FL-26-71054-03
52
Reasons for Proposed Solutions
The solutions decided on by CATS (through an agreement between CATS Safety & Security and
Technology groups), were based on the application of supported integration systems that are
network capable, expandable as the agency continues to develop, user friendly, maintainable,
locally supported, durable, secure and securable, with various levels of administration or
permissions assigned, graphical (layouts and graphics), and upgradeable. It was understood that
the application had to contribute to system efficiency and effectiveness to secure the assets and
resources of the Charlotte Area Transit System and provide for passenger, employee, and general
public safety and security.
Threat and Vulnerability Assessments
A formal Threat and Vulnerability Assessment (TVA) has not been documented thus far;
however, the Charlotte Mecklenburg Police Department has conducted several Crime Prevention
Through Environmental Design (CPTED) studies. Some of the improvement recommendations
from the CPTED study were considered and have led to many improvements and considerations
in facility design efforts.
In considering the available options, CATS considered the experience of other transit agencies
with various security systems viewed as some of the most effective and efficient available today.
CATS wished to install security systems that allowed for expansion without becoming outdated
prematurely. CATS considered history of the product, vendor support and reputation, other
agency experience, durability, destructibility, integration with other systems, networkability,
maintainability, levels of permission / restriction, compatibility, and user friendliness. CATS
staff performed side-by-side comparisons of similar products, where appropriate, to evaluate the
best solution and provide the business case.
CATS considered the impact on staff and operations to determine how to accomplish the highest
level of security, while maintaining the CATS Mission: “To improve the quality of life for
everyone in the greater Charlotte region by providing outstanding community-wide public
transportation services while proactively contributing to focused growth and sustainable regional
development.”
Solutions Proposed/Implementation
The following significant physical security management solutions have been implemented at
CATS:
•
•
•
•
•
•
Identification cards/key cards
Access control/security management
Fire/life safety system
Key/lock management
Facility video camera system
Perimeter security
FTA-FL-26-71054-03
53
Identification Cards/Key Cards - CATS chose SMART card technology by HID as its
identification employee identification card. Each card is a 64-bit SMART card and is currently
also used as a key card. Each employee identification card is fully covered on both sides with a
multi-color background image, the CATS logo, CATS division (e.g., Operations) vertically on
the right front side of the card, employee first and last name on both sides of the card, the
employee’s section (e.g., Planning), the employee’s unique ID number, the employee’s photo
and photo ghost images on both sides of the card. These details make the card difficult to
duplicate. Members of the Incident Management Team also have a yellow banner indicating
such on each side of the card for easy viewing from a distance. The cards are presented to iClass
R40 card readers by the authorized employee to gain passage to a permitted area. In high
security areas, iClass R40 card readers with numerical keypads have been installed. This
requires the employee to add a unique numerical password after presenting the card to the reader.
Although not currently in use at CATS, these SMART cards can be used to gain computer access
and a multitude of other business management applications, e.g. maintenance station kiosks. In
the future, CATS may consider using the SMART cards and readers in conjunction with
biometric devices, which would eliminate the possibility of allowing someone to borrow a card.
Access Control/Security Management (Andover Controls Continuum Cyberstation®)–In April
2005, CATS entered into a contract with SimplexGrinnell to install the Andover Controls
Continuum Cyberstation (ACC) building systems operating platform, for security
management/access control. CATS chose ACC because of its integration and inter-faceable
strengths. Although CATS is using the Andover System for security management, it also offers
modules for HVAC control, lighting, time tracking and virtually any other system that utilizes
input and output devices. The system includes a graphics suite for integrating employee photo
and system graphics, such as floor plans showing device locations and state, i.e., alarm, locked,
unlocked, etc. The system database has several fields that include information specific to the
employee, name, address, work location, auto, license plate, emergency contact, blood type,
seniority, etc. Every door or device is considering an “area” and therefore allows virtually any
combination of access. Day and hour schedules are programmed specific to each job or
employee. From each workstation or remotely via remote desktop or with installation of a
license key, the assigned administrator or manager, by permission level, can grant or deny
access. Any door or device can be remotely controlled, locked or unlocked, programmed to a
schedule. All doors can be secured or released remotely as desired. Devices can be set to alarm
under designated conditions, e.g., door ajar, unauthorized attempted access – lockout, fire, fire
trouble, etc. Virtually any condition can be set to alarm, as necessary, and any device or contact
can be programmed into the system. The Andover system was chosen by CATS because of its
network integration, expansion tested to over 4 million devices and being able to interface it with
other systems. In comparison to other systems, the Andover system was the most robust and met
CATS growing needs. Every event and all user activity are logged in a non-alterable database,
as an audit trail.
Prior to deciding on the right solution for the CATS application, the City of Charlotte required
extensive review and testing in an attempt to ensure that existing applications were not adversely
impacted by the installation of a new application. Although a necessary step to also maintain the
network integrity and security, this step added time and consideration by other groups. Most
FTA-FL-26-71054-03
54
reputable established vendors understand this requirement and were willing to work with the
respective staff to help ensure a smooth installation.
For software applications it is necessary to determine that the vendor has the capability and
capacity to provide reasonable system support. In addition to being able to support the system
through updates, response time can be critical and should be considered in the selection process.
The figures below provide sample screen shots of the Andover Controls system. The screen on
the left is one of the customized views requested by CATS during the development phase. The
screen replicated on the right is one of the graphic floor layouts representing the status of the
doors on this layout. The door status changes when open or ajar. Any condition can be
programmed to alarm at the system administrator’s discretion.
Andover Controls System screen
Floor map with door lock status
Fire/Life Safety System (SimplexGrinnell Fire Annunciator Panel)–CATS chose the
SimplexGrinnell panel because of the capability to integrate other facilities fire systems into the
Main Fire Panel. The CATS fire system is also integrated with the ACC. The figures below
depict the address and status of every fire device, i.e., tamper switches, smoke, heat and duct
detectors, fire pull stations, water flow switches, etc.
Personnel screen with menu options
Reports menu
FTA-FL-26-71054-03
55
Key/Lock Management–CATS selected the Ingersoll Rand Schlage Everest D Restricted
Patented Security Keyway for its lock hardware or “brass” key system. The reason for this
selection was that Schlage offers a high quality lock core pinning system and keyway offering
high security at a moderate cost, but reasonable for the quality of the system. The key system
chosen is a restricted patented keyway, available only to CATS for 15 years. This system was
selected, because it is security features, e.g., difficult to pick due to the core construction and
keyway design. The keys themselves are of sturdy construction, which reduces the chance of
breaking or shearing in the lock core and then left unattended, allowing relatively easy access by
an unauthorized individual. CATS, with the assistance of a local locksmith, established a
multiple level hierarchy considering its anticipated future development and facility construction
or Great Grandmaster Keying scheme. Each facility and, in a few cases, a function, e.g., Office
of Safety & Security, have been assigned a “grandmaster” key with subordinate master, sub
master and change keys. In a couple of instances sub grandmasters were established, i.e., for
contractor janitorial services and telecom/server rooms.
All key distributions were by job functions and requirements. Each key was serialized with a
unique number and assigned to an individual. Each and every key is tracked by issuance and
recipient’s acknowledgement signature. The keys are further tracked with the resource of the
SiteMaster® software package. This software, with a multiple installation license, is installed on
a few computers and the database is stored on a network server, which allows authorized users
access to a single database from multiple computers. The SiteMaster® software database allows
entry of individual information, e.g., name, facility location, department, section, door, core
pinning/construction, key cut by description, key assignment, key return, and receipt
documentation.
Facility Video Camera System–The CATS South Tryon Bus Garage and the new transit centers
are equipped with several cameras that are remotely accessible by an authorized user through the
City network. All facilities either under construction or rehabilitation will be outfitted with
similar remotely accessible camera systems. The cameras can be set for motion detection
recording to conserve on the hard drive space of the digital video recorders (DVR). Each DVR
depending on the model can accommodate either eight or 16 DVR’s. Under normal conditions,
the DVR stores recorded data for 10 days. The DVR drive can also be accessed remotely, played
and recorded to another storage device, e.g., server, desktop personal computer, etc. An
authorized user can control pan, tilt, and zoom (PTZ) camera functions, which are recorded and
stored. CATS uses a variety of cameras, fixed, PTZ, color, pendant-mounted, dome-ceilingmounted, and special cameras for covert operations. CATS safety and security staff believe that
the use of cameras reduces criminal or deviate behavior because one it likely to be caught and
charged with the appropriate criminal violation. The video system is frequently monitored
remotely by CATS security staff and requests have been made by local police to assist in
criminal prosecution or case closure.
Perimeter Security–The CATS South Tryon Bus and Davidson Street Bus garages have full
perimeter fencing. The fences were installed to control access by unauthorized individuals.
Although the primary gates are not always closed and secured, access points are. This includes
FTA-FL-26-71054-03
56
unauthorized or non-CATS vehicles. A three-level parking deck was built at the South Tryon
Bus garage, with access to the second and third levels controlled by use of a SMART key card to
open the gate arm. All employees are issued serial-numbered mirror vehicle tags, which are to
be displayed anytime the vehicle is parked on CATS property. The parking deck has signs
posted throughout restricting unauthorized parking, enforceable by the Charlotte Mecklenburg
Police Department. The perimeter and parking deck are also under video surveillance. The
parking deck has 10 emergency call boxes that interface with the bus operations dispatchers, who
would contact the police in the event of an emergency.
Fencing along south S. Tryon perimeter
Camera/intercom at entrance
Cost/Benefit Analysis
CATS did not perform a formal cost benefit analysis. However, the needs of the system and
security requirements were met and, while cost was a consideration, it was not the only
consideration. Functionality, systems integration, network relationship, vendor support, future
development and expansion, capability and capacity were some of the considerations applied,
prior to acceptance.
Measure Effectiveness of Implementation/Performance Indicators
CATS Safety and Security staff believes that the installation of its security management
resources have greatly increased the physical security of its facility.
Currently, CATS does not have enough data to confirm that security improvements have reduced
breaches of security; however, CATS believes that, considering the extensive effort in reviewing
the available security protection possibilities, consultation with resource experts, past experience
and sound practices, the systems and measures taken will ultimately provide extensive protection
in securing its assets and protecting its employees.
FTA-FL-26-71054-03
57
The measures taken to date enable CATS to interface with its current as well as new systems and
provide for considerable growth with the unlikely possibility of “outgrowing” the security
system. The systems chosen took into account the future of the agency.
Lessons Learned/Conclusions
CATS staff realized that it takes a strong commitment from management and support of its
employees to implement new measures, especially when it involves security or the perception of
security. Not everyone felt the security improvements were in their best interest; some were
concerned that it would allow management to gain more control. This feeling created some
slowing in the momentum and implementation delays.
To successfully implement the broad and sweeping changes that require the involvement of
many sections, especially technology, significant time and patience are required to complete the
installation. This included various systems and network testing to ensure compatibility with the
existing systems, particularly for the Andover Controls and SiteMaster software packages.
The chosen security systems created a major impact on projects that were in the design stage
already and included basic specifications that were not compliant with the now new systems.
This required specification changes and, in some cases, issuance of change orders, resulting in
additional costs to the system. This created addition work for the design team, the consultants,
and the procurement staff. Many meetings had to be held to resolve issues; some are still being
addressed.
When considering security applications, it is critical to collect as much available information as
possible and study the information, remembering that most companies promote that their
products are the best. Those responsible must consider what is best for their workplace and
environment.
FTA-FL-26-71054-03
58
Case Study
MASSACHUSETTS BAY TRANSPORTATION AUTHORITY (MBTA)
TRANSIT POLICE DEPARTMENT
BOSTON, MASSACHUSETTS
Transit Agency Profile and Reason for Selection of Transit Agency
Overview
The Massachusetts Bay Transportation Authority (MBTA) is the nation’s oldest and fifth largest
transit system. Its service area covers more than 3,200 square miles across 175 cities and
municipalities, extending as far south as Providence, Rhode Island. Servicing more than one
million passenger trips each day, MBTA operates and supports more than 2,200 vehicles along
162 bus routes with several thousand stops, light and heavy rail systems (subway and aboveground), and 5 boat routes.
The MBTA Transit Police Department is the principal law enforcement agency for all personnel,
passengers, facilities, stations, properties, equipment, and vehicles within the MBTA service
area. The Department began in 1968 with 35 officers and has evolved into a force of 250 sworn
officers, all specially trained to function in a transit environment. All officers have been trained
in the National Incident Management System (NIMS) ICS training levels 100-700, and all have
received advanced training for identifying and managing incidents involving weapons of mass
destruction. In addition to its patrol operations, the Department’s specialized services include
intelligence operations, criminal investigation, crime analysis, detective services, field training,
K-9, special operations, community services, prosecution, motorcycle operations, and explosive
detection.15
The innovations of the MBTA Transit Police Department have been recognized by the American
Public Transportation Association (APTA), who honored them as the sole Law Enforcement
recipient with their “Innovation in Government Award,” and by the International Association of
Chiefs of Police (IACP) who named the Department as a semifinalist for its prestigious WebberSeavey “Award for Excellence in Law Enforcement,” placing it among the top 25 programs in
the world.
Since January 2003, the MBTA Transit Police Department has served under the leadership of
Chief Joseph C. Carter (currently Vice-President of the 20,000-member International Association
of Chiefs of Police). In his first few months, Carter led a comprehensive effort, including
numerous focus groups drawn from all ranks within MBTA and members of the community, to
develop a “Plan of Action”16 that would restore public trust and confidence in the MBTA Transit
Police Department and advance police operations in the transit environment.
15
MBTA Transit Police Department, http://www.transitpolice.us/
MBTA Transit Police Department. June 2003. “The Plan of Action: A Commitment to
Excellence.” Boston, MA: MBTA Transit Police Department.
16
FTA-FL-26-71054-03
59
Consistent with Homeland Security Presidential Directive/HSPD-8, antiterrorism and homeland
security were among the top priorities. The overarching philosophy for enhancing security was
to embed antiterrorism efforts in a broader framework of proactive, information-driven,
geographically-based and community-oriented policing, and to supplement with specialized
services, rather than carve out antiterrorism as a specialty function. The philosophy emphasized
that, as public trust and community partnerships became stronger, passengers would be more
alert and more likely to interact with and report problems to MBTA Transit Police officers.
Structurally, the Department decentralized by dividing the jurisdiction into six Transit Police
Service Areas (TPSAs), five of which are geographically-based, and the sixth based at
headquarters. A commander was appointed for each TPSA, and each area has an Advisory
Committee. Using the CompStat system, each commander is responsible to monitor and solve
crime, fear of crime, and security-related problems in his/her own TPSA. Leaders are held
accountable for these outcomes in weekly meetings of commanders from all TPSAs. In the first
nine months of operation under the TPSA model, MBTA crime declined by about 13 percent,
while crime in the greater Boston area, outside the MBTA, was rising.
Problem Identification and Need for Innovative Security Measures
In the report “Securing the MBTA: A Strategy for Homeland Security,” the MBTA Transit
Police Department concluded that:
… Based on these factors, state and local officials should consider the MBTA as
potentially highly vulnerable to attack by terrorists. The system is well-known,
highly visible, and a critical part of the transportation infrastructure of the Greater
Boston Area. It is an open system, accessible to the general public, and it covers
and extensive geographic area that makes effective countermeasures difficult.17
The MBTA Transit Police Department has examined, and continues to monitor, incidents and
trends in transit-related terrorism throughout the world and to review and modify their policies,
procedures and operations accordingly. Their seven-person Intelligence Unit continuously
monitors more than 40 databases, collecting and analyzing information on threats to transit
security from terrorism and others criminal activity. The unit’s capacity makes MBTA Transit
Police Department the state’s lead agency for transit security intelligence and positions them as
the statewide clearinghouse for this information. Their products are regularly sought and read by
the regional transit authorities, the Commonwealth’s Fusion Center, other regional intelligence
centers, and transit authorities throughout the world.
Given clear historical evidence that transit systems are attractive targets for terrorism, and
learning from the aftermath of the 9/11 attacks that communication systems are among the most
vital of structures for effective response, the MBTA Transit Police Department recognized the
need to prioritize effective communications and to protect communications personnel and assets.
17
MBTA Transit Police Department. November 2003. “Securing the MBTA: A Strategy for
Homeland Security.” Boston, MA: MBTA Transit Police Department.
FTA-FL-26-71054-03
60
While most terrorist transit attacks in the past have been directed at passengers on specific
vehicles, they assessed that the hub of operations and control, if left vulnerable, could endanger
many more people and vehicles and cause massive economic damages and service disruption.
MBTA’s Operations Control Center (OCC) is the system’s hub for all operations and safetyrelated communications. Several key challenges existed for improving communications and
protecting OCC assets. First, personnel from the OCC and the MBTA Transit Police Department
operated on different and non-interoperable radio frequencies. All calls from the public
originated in the OCC, with information subsequently transferred to the police, which made
communications more laborious and time-consuming and miscommunications inevitable. It was
estimated that 9 of every 10 emergency “after-action reports” involved human communication
problems between the police and OCC. Second, the OCC, located in the MBTA general office
building, was protected only by a non-police security guard and a series of three successive keycard access doors. There were no on-site resources to protect the OCC personnel and assets in
the event of infiltration. Third, the OCC was the sole and non-redundant source for system-wide
operational control. If the Center became non-operational for any reason, service would be
disrupted throughout the entire system until the OCC could be restored.
Previous Attempts to Address Problems and Results
Since September 11, 2001, the MBTA Transit Police Department has implemented a variety of
antiterrorism measures to enhance awareness, prevention, preparedness, response, and recovery –
the five domains in the Department of Homeland Security’s National Response Plan:
To enhance awareness, they have:18
•
•
•
•
•
•
•
Established an MBTA Safety and Security Anti-Terrorism Task Force to coordinate
system-wide anti-terrorism and counterterrorism efforts.
Conducted several system threat and vulnerability assessments.
Expanded training for front-line personnel.
Established a TransStat process to improve management accountability and monitor
implementation of recommendations.
Participation in the US Attorney for the District of Massachusetts’ Joint Terrorism Task
Force.
Developed a high-level intelligence unit to collect and disseminate transit-related security
information.
Enhanced collaboration with a variety of federal, state, local, and private sector agencies.
To enhance prevention, they have:19
•
•
18
19
Provided officers with updated threat and vulnerability information.
Given authority and accountability to officers to monitor and solve security or
vulnerability-related problems within their assigned service area.
Ibid at 10.
Ibid at 12-13.
FTA-FL-26-71054-03
61
•
•
Monitored problem-solving efforts through CompStat.
Mobilized and trained community partners to report relevant information and
observations.
To enhance preparedness, they have:20
•
•
•
Developed potential incident scenarios and response plans using threat and vulnerability
information.
Developed systems and processes for rapidly identifying emerging indicators. Their
expertise in this regard has been sought by the London underground transit authority
who has requested officers from the MBTA Transit Police Department to train their
officers and trainers in these procedures.
Trained all personnel to rapidly identify emerging incidents and to take appropriate
mitigating action.
To enhance response, they have:21
•
•
•
Developed formal partnerships and liens of communication with health department
officials, MEMA, BEMA, and related response agencies.
Participated in training exercises to identifying effects of WMD attacks.
Implemented protocols for OCC to notify the MBTA Transit Police Department if an
attack occurs.
To enhance recovery, they have implemented several measures designed to restore service in the
event of disruption; “however, a review of the MBTA Transit Police Department’s systems and
operations reveals a number of issues and single points of failure that could disrupt the continuity
of operations following a catastrophic emergency.”22
The MBTA Transit Police Department’s initial solution to improve communication with the
OCC was to acquire interoperable 800MHZ radio technology. This removed an unnecessary link
from the chain of transmitted information, but direct communication between police dispatchers/
call-takers and OCC personnel continue to be problematic.
To further secure OCC personnel and assets, a non-sworn security officer was hired to monitor
the initial point of access to the building and to track the activity of hundreds of video
surveillance cameras throughout the MBTA service area. Having only one person monitor the
screens proved to be an inadequate solution.
20
Ibid at 17.
Ibid at 20.
22
Ibid at 22.
21
FTA-FL-26-71054-03
62
Reasons for Proposed Solution
The MBTA Transit Police Department established the criticality of communications assets and
the vulnerability of single points of failure through a multimodal assessment process that
included:
•
•
•
•
Review of policies, procedures, and security audits
Interviews with key personnel
Site visits to key facilities and stations
Review of recent system threat assessments, including:
o FTA Security and Counter Terrorism Readiness Assessment, conducted by Booz
Allen
o TSSI Threat Exposure and Response Matrix (TERM), conducted by Total Security
Services International
o MBTA Safety and Security Anti-Terrorism Task Force assessment
o Triennial On-site Security Audit by the Massachusetts Department of
Telecommunication and Energy, conducted by Interactive Elements, Inc.
o Security Inspection Program for the 2004 Democratic National Convention.
It was determined that removing communication barriers and enhancing the clarity and accuracy
of information flow during emergencies, a high priority, would require more direct interaction
between police dispatcher/call-takers and OCC staff. The review concluded they were neither
co-located nor accessible to each other by radio. In addition, no police were stationed to protect
OCC personnel and to do so would have required adding new police officers or pulling current
officers away from other assignments.
Physical security enhancements were identified as a way to mitigate OCC’s vulnerability as a
single point of failure, but would not reduce the down time for any service disruption. Without
any back-up system, if the Center were rendered non-operational, nearly all transit services
would come to an indefinite standstill. Any effective solution would require some auxiliary or
redundant control.
Solution Proposed/Implementation
The MBTA Transit Police Department concluded the review of their homeland security strategy
by noting that a serious weakness of any homeland security initiative is that they become highly
personnel and resource intensive. They recommended that, as homeland security strategies are
implemented, the Department should take care to maintain traditional crime prevention activities.
The multifaceted OCC challenges of impaired communication, site vulnerability, and operational
non-redundancy could not be completely eliminated by a single solution. The non-redundancy
problem could only be addressed effectively by implementing an auxiliary or redundant control.
Senior OCC operations leaders addressed that problem by pushing for a new alternate, redundant
control center located in another part of the greater Boston area. The cost of this effort is
substantial, but deemed necessary for the MBTA system to operate safely, not only from terrorist
attack, but from any systemic disruption.
FTA-FL-26-71054-03
63
The communication and personnel protection problems were strategically addressed principally
by invoking a non-mechanical solution. Radio communication had been achieved, but
information to and from police officers and other responders still involved intermediaries.
MBTA Transit Police Department decided to move their dispatchers and call-takers (all of whom
are sworn police officers, per union rules) from headquarters into the OCC.
MBTA determined the OCC floor space could be more efficiently configured and could
accommodate the additional police personnel. This permitted face-to-face communication and
information exchange between the OCC and police personnel, ready hand-off of emergency calls
from the public, and direct lines of communication among and between key emergency response
personnel within the transit system. In addition, co-locating that function on the floor of the
OCC placed sworn police personnel inside the Center at all times, providing a tertiary line of
defense, if necessary, from unauthorized intrusion.
The proposed solution was in keeping with the Department’s strategic principle: “Cost-effective
implementation through better use of technology”–in this case, human technology. It did not
require any additional staff or staff reductions. It did not require product training or technical
maintenance cost. It did, however, require that several policies and procedures be re-written to
account for the new direct lines of communication. The only serious potential obstacle was the
“change in working conditions” (a phrase pertaining to the terms of work in union or collective
bargaining agreements) in the event that union representatives objected to the dispatchers and
call-takers being moved to the OCC. Fortunately, this concern never emerged as a barrier to
implementation. Although parking availability at the OCC was a greater challenge than at
headquarters, affected personnel seemed to believe that the benefits of enhanced security and
improved communication outweighed any nominal inconvenience. Passengers benefited due to
the fact that their emergency calls would be quickly directed to the police telecommunicators.
Passenger and staff operations were not disrupted in any way.
Cost/Benefit Analysis
A formal cost/benefit analysis was not conducted. However, the proposed solution did not
require funds beyond those already allocated. Rebuilding the OCC floor was already scheduled
to make more effective use of space.
Measure Effectiveness of Implementation/Performance Indicators
Information on measuring the effectiveness of implementation/performance indicators was
unavailable.
Lessons Learned/Conclusion
The relocation of police dispatchers and call-takers to the OCC has only recently been
implemented. No data are available regarding its effectiveness or impact. The effect of
enhanced security at the OCC may be difficult to measure because no OCC infiltration and
attack has ever occurred. Improvements in communication can be measured both by monitoring
FTA-FL-26-71054-03
64
complaints from OCC and police telecommunications personnel and by reviewing emergency
after-action reports.
The following outcomes of several post-9/11 MBTA security initiatives are known:
•
•
•
The geographic-based division of the jurisdiction into six TPSAs has been followed by a
13 percent reduction in criminal activity.
Passenger and public reports of suspicious activity on transit vehicles and properties
“increase dramatically” after each MBTA Transit Police “See Something, Say
Something” campaign. These campaigns are timed so .they do not .coincide with high
profile incidents or heightened alert levels.
Public trust and confidence in the MBTA Transit Police has increased, as evidenced by
increase passenger-initiated interactions and feedback from public members of the TPSA
Advisory Committees.
FTA-FL-26-71054-03
65
FTA-FL-26-71054-03
66
Case Study
CENTRAL FLORIDA REGIONAL TRANSIT AUTHORITY (LYNX)
ORLANDO, FLORIDA
Transit Agency Profile and Reason for Selection of Transit Agency
Overview
The Central Florida Regional Transportation Authority (CFRTA) was formed in 1994. Initially,
public transportation was provided under the official name of Orange-Seminole-Osceola
Transportation Authority (OSOTA), which was formed in 1972. In June 1984, OSOTA changed
its operating name to Tri-County Transit, which was later changed to LYNX in 1992. In October
1994, a merger of OSOTA with the former Central Florida Commuter Rail Authority became
official, and the merged organization became the Central Florida Regional Transportation
Authority (CFRTA). As a successor to OSOTA, the CFRTA continues to be known as LYNX
and serves as the focal point in developing all modes of public transportation in the Central
Florida region.
A five-member Board of Directors serves LYNX. The members of the Board of Directors
include one commissioner from Osceola County, the chair of the Seminole County Board of
County Commissioners, the mayor of the City of Orlando, the mayor of Orange County, and a
representative of the Florida Department of Transportation (FDOT). Each serves a term as
designated by Section 343.63, Florida Statutes. The CFRTA Board of Directors typically meets
on the fourth Thursday of each month to conduct the business of the Authority.
The tri-county area, which includes Orange, Seminole, and Osceola counties, remains one of the
top growth areas in the country and is one of the premier tourist destinations in the world. The
area is ranked as one of the best areas in which to live and work by leading national business
publications such as Fortune 500. This area has experienced significant growth in population
over the last several years and is expected to continue for the next 20 years. The population was
1.63 million in 2005 and is projected to be 1.84 million in 2010 and 2.39 million in 2025.
Economy
LYNX plays a major role in the Central Florida economy. “The Economic Importance of LYNX
to Central Florida—2003,” a report by W. Warren Mchone of the University of Central Florida’s
College of Business Administration and Department of Economics, provides a comprehensive
analysis of LYNX’s role in the Central Florida economy. The report provides several key facts
that underline that role of infusing the local economy with federal and state revenue, as well as
generating numerous economic benefits for customers, suppliers and other local businesses
throughout the region. Some of these key facts include:
•
Worst case loss of annual economic output if LYNX were not available: $106.8 million
dollars.
FTA-FL-26-71054-03
67
•
•
•
Medium case loss of annual economic output if LYNX were not available: $46.3 million
dollars.
Worst case loss of jobs if LYNX were not available: 4,062.
Medium case loss of jobs if LYNX were not available: 2,029.
Service
LYNX provides fixed-route, paratransit, and vanpool service. Fixed-route bus service is
comprised of 62 routes, called “Links,” serving the tri-county area. The service operates 7 days
a week. Weekday operating hours are from 4:15 a.m. to 3:10 a.m. Saturday service is operated
from 4:15 a.m. to 1:10 a.m.; on Sunday, service is operated from 4:39 a.m. to 11:30 p.m.
LYNX’s active fixed-route fleet consists of 238 lift-equipped buses; currently, LYNX’s peak
requirement is 197 buses. LYNX manages the paratransit operation via a single contracted
provider. The service is provided with 169 vehicles and is available from 5:00 a.m. to 1:00 a.m. 7
days a week. While federal ADA regulations only require ADA paratransit service within ¾ of a
mile of fixed route, LYNX provides ADA service throughout the three-county area. LYNX’s
ridership continues to grow to record levels, averaging over 2 million riders per month. In FY
2005, LYNX provided nearly 25 million trips.
Problem Identification and Need for Innovative Security Measures
The majority of Florida’s transit facilities utilized today were designed prior to the events of
September 11, 2001. In LYNX’s case, the facilities that LYNX owned (South Street Operations
base and the Downtown Bus Station) were over 25 years old. Safety and security requirements
were not addressed at the time these facilities were designed and constructed and have, for the
most part, been an after-thought/add-on at both facilities.
The South Street operations base complex dates back to the early 1970s when the transit
company first began to utilize the facility. The facility was shared with the local school board
until the early 1990s when the facility was completely taken over by LYNX. As LYNX
expanded, due to increases in ridership in the 1990s, additional leased properties were added to
facilitate the needs of expanding operations (the Princeton operations base and the leasing of
office space at the school board learning center).
In the late 1990s, LYNX began purchasing property to continue to expand operations to keep
pace with ridership demands. LYNX purchased a 27-acre parcel of land in an industrial area to
expand the main operation facility with the intent of moving out of the outdated South Street
Facility. This new, extremely modern complex is known as the LYNX Operation Center (LOC).
The new center will accommodate over 200 additional buses. LYNX will occupy the LOC
complex in the fall of 2006.
The old Downtown Bus Station was a ¼ city block complex that had been used since the early
1960s as the main public transit transfer station for LYNX. This structure was remodeled in the
early 1980s to address patron needs and operational requirements. The facility design was an
open-air structure with 2 bus lanes and 24 bays. The design of this facility did not accommodate
40-foot buses. There were two small customer service windows to handle customer needs and
FTA-FL-26-71054-03
68
public restrooms were available. There were no designated public congregation areas or any
general use in-door space for the public. Customers and operators were exposed to the weather
conditions of the Orlando environment. The location of the Downtown Bus Station did not allow
any room for expansion.
With the possibility of a “new start” light rail system and the need to expand existing services to
better accommodate customer needs, LYNX chose the current property location for the
construction of the new LYNX Central Station (LCS) building. The basic concept for this
facility was to develop a building with an inter-modal design as a critical element as well as
combining both administration offices with an attached main bus terminal complex. The LCS’s
basic design was developed prior to the events of 9/11; however, security elements not originally
developed in the initial design of the building were added prior to the beginning of the
construction phase of the project.
The LCS building includes a six-story administration tower; a patron-accessible, fully airconditioned terminal with 3 bus lanes and 27 bus bays; and space available for retail use. A
larger customer service area was included in the terminal. The LYNX Central Station covers an
entire city block bordered by city streets and is directly adjacent to active CSX railroad tracks.
LYNX owns all property adjacent to the railroad tracks to allow for future transit or commuter
rail connection.
It was acknowledged by both LYNX management and the design team that, with the larger
building size and the addition of the administration tower, this complex would need a more
aggressive integrated security program than was originally conceived. The additional cost of the
integrated security system improvements for the LCS was added to the project’s capital budget
after the original bid specifications had been developed and after design and contact bids were
awarded. The security system project was contracted for directly through the security system
vendor and not through the construction contract. This was done to maintain a higher level of
security integrity for this critical piece of work. It was recognized through this process that
addressing security issues early during the design phase or construction phases of most transit
projects is critical. When neglected early in design additional costs associated with project
delays, re-design, limited integration or capability problems can arise.
Previous Attempts to Address Problems and Results
Prior to the 2004 opening of LCS, LYNX had not designed a new building or been involved in
the design of a new facility. Facilities were passed on from local funding partners to LYNX.
Security was a feature added to an existing facility as a post-original design concept but not an
integral element of the original design; hence, the security component was “force fit” into the asbuilt facility. To assist in addressing potential security issues not addressed by the facility
design, LYNX implemented an operational change to the LCS. Unarmed contract security
officers were contracted for and put in place to limit access by unauthorized personnel to
designated safety sensitive areas, as well as provide an overall increase in the patron perception
of security at the LCS.
FTA-FL-26-71054-03
69
Reasons for Proposed Solution
Based on the post 9/11 changes to transit in the U.S. and the need to provide a safer and more
secure environment for the riding public, LYNX followed and implemented the directives of
FTA and APTA. Past Threat and Vulnerability Assessments (TVAs) performed at the LYNX
LCS and sponsored by FTA noted that public access was not restricted at the site and safety
sensitive areas were not separated and confined. The proposed solution was to use currently
available “off-the-shelf” security technology to increase the level of security delivered to these
areas which are constantly accessed by LYNX employees. Cameras in public areas are used to
provide a means of monitoring without hampering public use. LYNX’s current TVA will be
used to benchmark current security measures as well as define the need for future improvements
in the security program application.
Solution Proposed/Implementation
System Security Program
Based on the pending opening of the new LCS building and the associated security management
problems, LYNX started developing a formal authority security program in 2003. The Safety &
Security Division was formed and placed under the Operation Support Division in the Transit
Operations Department. Once organized, one of the first actions taken by the Safety & Security
Division was to develop contract language and then award a contract to a private security
company to supply uniformed armed and unarmed officers at all LYNX facilities. LYNX also
entered into a verbal agreement with the Orlando Police Department (OPD) to supply off-duty
officers at key LYNX facilities on a regular basis during normal LYNX operating hours.
LYNX Central Station (LCS)
In addition to the operational security support, a new integrated security system was also
incorporated into the LCS building design. The system now includes cameras that view of all
public areas, bus areas, and perimeter entrances and exits. Electronic ID cards and electronically
control door contacts have been placed on all perimeter doors limiting access to non-public
areas. Entrance readers and a secondary Access Control System (ACS) device (bio-readers) are
used to prevent and control unauthorized persons from entering any area that contains money.
All of the cameras and accessed controlled doors are electronically recorded in a CCTV control
room, which is staffed by members of the contract security force 24 hours a day, 7 days a week.
All camera and ID card transactions are digitally recorded for 30 day time spans and archived for
one year. The CCTV control room monitors all activity in the public areas as well as the
entrances and exits to the non-public areas. In addition, the CCTV also monitors the Information
Technology (IT) room as well as all exists and entrances to this room. The IT room houses the
main computer system that uses current information technology to interface/integrate all three
main LYNX facility locations to one computer based system effectively allowing access and
monitoring to properly password protected LYNX staff on the local network. This main
computer system also runs the LYNX network and phone systems.
FTA-FL-26-71054-03
70
LYNX South Street Operation Base (SST)
The LYNX South Street base is currently being retrofitted with a system-wide compatible
camera and perimeter security system that will be networked with and monitored at the LCS
CCTV control room. Once completed, CCTV cameras will monitor public accessible areas as
well as several other vital areas throughout the complex. All non-public areas will require an ID
card to access that area. Because interoperability and growth was a key consideration in
developing the integrated security system standards for the LCS, the same basic design and
standards are being used at South Street facility. Currently, the LYNX security force maintains
an unarmed security officer at the main entrance of the South Street facility 24 hours a day,
seven days a week.
LYNX Operations Base (LOC)
This new facility will be occupied in October 2006 and will have the same integrated security
system as the other two LYNX facilities to allow for ease of system integration functions and
compatibility. The cameras and door entrance system will be monitored at the LCS CCTV
control room. The LYNX security force will have an unarmed officer on property 24 hours a
day, 7 days a week.
LCS CCTV Monitoring Room
LCS Platform, contracted security officers
FTA-FL-26-71054-03
71
Dome PTZ camera
Wall Mounted PTZ camera
BIO- ID card reader
Standard ID card reader
Training
LYNX, in partnership with the security contractor, implemented a “Transportation Services”
training course. The contactor was responsible to ensure all officers were properly trained to
perform the services LYNX required. Additional training on the operation of the LYNX security
system, as well as operating and emergency response procedures, were also provided to all
designated LYNX and contract security staff. LYNX staff training on the security system was
included as part of the integrated security system installation contract.
FTA-FL-26-71054-03
72
Multi-camera view
DVC recorder
LYNX Central Station (LCS) – lane one
Maintenance
LYNX is entering the second full year of operation of the integrated security system. As part of
the installation scope of work, a full maintenance warranty was included. The LYNX Facility
Maintenance Team is supporting the mechanical portion of the integrated security system. The
installation contractor is supporting the computer and electronic “back-bone” of the system. To
reduce any potential increase in long term maintenance costs, LYNX is currently negotiating a
full service maintenance contract with the system installer.
FTA-FL-26-71054-03
73
Cost/Benefit Analysis
Since the integrated security system is relatively new, there is limited historical data available to
developed actual cost savings. LYNX has been able to hold the costs associated with the
contract security force and police constant. The ability to document security related events has
reduced LYNX’s liability expenses by providing defensible evidence in legal cases directed
against LYNX. The LYNX security system has verifiably assisted law enforcement in
monitoring and suppressing criminal activity on LYNX property which also represents a
substantial cost savings realized by the authority.
Measure Effectiveness of Implementation/Performance Indicators
The integrated security system acting in concert with the LYNX security force program was a
new direction for the agency. The system has met LYNX’s expectations and currently exceeds
the authority’s needs in its ability to expand well beyond any current facility growth plans.
LYNX is still learning about the total capacity of the security system and how best to use it
within the organization. However, since the security program and integrated security system
were put in place at the same time LYNX entered its new facility, there is no historical data to
base any performance results on, but clearly improvements have been noted.
With the assistance of LYNX’s new integrated security system, the current security program is
offering a significant increase in reported criminal activity and incidents at the LCS. The
reporting of criminal activity at the LCS by contract law enforcement and security officers is
greater then that of the old LYNX Downtown Bus Terminal. The new LCS is by far larger in
physical size, has more patron boardings per day, is located several blocks from the Old
Downtown Bus Terminal, and has a much more advanced ability to document security events.
This comparison appears to have identified that LYNX may not have had a criminal activity
increase at the new LCS as first thought, but just a much better identification and reporting
system via the new integrated security monitoring system.
A survey of LYNX’s customers has identified that they feel much safer in the new LCS facility
than they did in the previous location. The perception by LYNX’s patrons of a more secure
environment is consistent with customers and employees alike. With LYNX’s current
procedures in place, LYNX will be able to document the effectiveness of the security program
over the next few years.
Lessons Learned/Conclusion
A technology-based system or work force based system alone could not produce the cost
effective results needed by LYNX. The combining of the two systems has proven to be very
effective in providing a more secure operating environment for LYNX patrons, employees and
contractors. The capital outlay for LYNX’s technology-based, integrated security system allows
the current expenditure level of its security workforce to remain constant. LYNX now includes a
security component in all new facility designs and modifications. Current internal requests for
FTA-FL-26-71054-03
74
expansion of the security system to other areas within the LYNX organization denote that
security is a major concern within LYNX and is being addressed. LYNX’s focus is directed both
on the internal operations of the transit authority as well externally on public operations. The
current integrated security system is being recognized throughout the entire LYNX organization
as a needed and valuable program.
LYNX’s proactive approach to develop and implement an all inclusive security program, that
includes safety and security both for LYNX employees and its customers, has proven to be
successful, based on LYNX’s current experience, the capital outlay, and current
operational/maintenance costs. The program appears to be worth the investment, but it is
recognized that the investment and inclusion of security and security systems must take place
early in the design process for this investment to realize its real value to a transit system.
FTA-FL-26-71054-03
75
FTA-FL-26-71054-03
76
Case Study
BAY AREA TRANSIT DISTRICT (BART)
SAN FRANCISCO, CALIFORNIA
Transit Agency Profile and Reason for Selection of Transit Agency
Overview
The San Francisco Bay Area Transit District (BART) is recognized as being on the cutting edge
of rapid rail transit since the fully automated system began passenger service on September 11,
1972. The fast and comfortable BART vehicles with their high reliability and a train control
system that provides the highest level of safety were required to attract commuters from their
beloved automobile. Over the last 35 years, BART has accomplished its initial task and the
system has grown with additional stations and vehicles to meet the increasing demand. The
increased service also includes the San Francisco Airport, a destination long awaited by BART’s
loyal riders.
System Description
The District provides fully-automated, high-speed, urban rail mass transit for the San Francisco
Bay Area, serving San Francisco, Contra Costa, San Mateo, and Alameda counties. The system
consists of 105 miles of double track rail service and 43 passenger stations, and a 4-mile
underwater tube linking San Francisco with Oakland.
Daily patronage is about 330,000 passenger trips. Stations are staffed with station agents who
provide assistance in system usage and directional information to patrons as well as emergency
service support. In addition, the agents monitor station facilities for station maintenance and patron
safety. All stations are serviced by local bus companies to provide convenient commuting for
BART patrons. Station platforms are 700 feet long and are serviced by escalators and an elevator.
The right-of-way in which the trains operate consists of at-grade, aerial, and subway. BART
operates in an exclusive right of way with no grade crossings and with fencing on all at-grade
rights-of-way. Much of the right-of-way is in the freeway median to minimize using residential
and business property.
BART train cars are 70 feet long and have a capacity of about 200 people per car. BART trains
have a maximum of 10 cars and a minimum of 3 cars. A 10-car train can carry about 2,000
passengers under crush load conditions and about 700 passengers in a fully seated load.
Automatic Train Control (ATC) provides a failsafe train protection system and central supervisory
functions, including fully automated train operations and automatic schedule adjustment.
FTA-FL-26-71054-03
77
BART Operations Control Center
The Operations Control Center (OCC), located at the BART Lake Merritt Headquarters, provides
supervision over all phases of operations, including trains, patrons, system power, and wayside
equipment. The Central Manager is responsible, through controllers working in the OCC, for all of
the various functions that support revenue and non-revenue (e.g., maintenance) operations. The
primary control functions at the OCC are train control, third-rail power control, wayside equipment
control, alarm monitoring and response coordination. The OCC also coordinates assistance for
difficulties encountered with mainline vehicles, stations or wayside facilities, and provides
information to BART passengers.
Transportation Supervisors, through the Tower Supervisors, are responsible for all activities
performed in each yard area. These activities include third rail power control, changing train
lengths, movement through yard via route control, dispatching and receiving trains from mainline
and assigning Train Operators duties within the yard and for mainline service. Train Operators are
responsible for the train/cars they have been assigned to operate.
FTA-FL-26-71054-03
78
The Department of Rolling Stock & Shops maintains the revenue vehicle fleet and is responsible for
the movement of revenue vehicles within the shop areas and on yard leads. Cars are cleaned,
inspected, repaired, and stored in the yards and shops.
Problem Identification and Need for Innovative Security Measures
BART’s at-grade, aerial, and subway systems usually do not offer good concealment,
particularly with the frequency of the trains and the operating hours. In addition, during hours of
train operation, the opportunity for unauthorized persons to be in the right-of-way without being
detected by passing trains is greatly reduced. However, at night and in subway sections there is
greater opportunity to be undetected. There are longer headways between trains so fewer eyes
are available and lower lighting levels provide better concealment. Securing this operating
environment from the risk of criminal activity or terrorist attacks is very challenging. Currently,
there are no viable means of providing public access to the transit system that ensure an adequate
FTA-FL-26-71054-03
79
level of security while maintaining the “rapid” movement of people. After purchasing a ticket,
patrons have almost complete access to the passenger stations and trains.
BART recognized that one of their most basic security needs was ensuring access control,
particularly in more vulnerable locations, structures, and facilities. These include areas of higher
vulnerability where terrorist attacks would have the greatest impact to the system. While the use
of security forces, door locks, and card key access had provided sufficient security throughout
the system in general, facilities in remote locations and those with no permanent staff created a
need for additional innovative countermeasures.
Previous Attempts to Address Problems and Results
BART has always been aware of the need to control access to all its facilities. Locked doors,
fences, gates, and personnel training have historically been the barriers to uncontrolled access.
However, incidents such as 9/11 have caused public transit agencies to rethink their previous
control methods, which may not be sufficient given a terrorist bent on suicide to accomplish their
goal.
Reasons for Proposed Solution
The primary reason BART designed and constructed an Intrusion Detection System (IDS) was to
provide a capability that did not exist, reduce system security costs, and protect people and assets
from deliberate harm. Under the worst-case scenarios, BART could lose the ability to operate
major parts of the system, and thus severely limit mobility in the area. In addition, a major
incident could lead to high capital repair and/or replacement costs for system facilities.
Solution Proposed/Implemented
To formally identify and rank areas of high potential risk, BART conducted a Threat and
Vulnerability Analysis. A TVA provides an analytical process to consider the likelihood that a
specific threat will endanger the transit system. Using the results of a transit security and
emergency management capabilities assessment and a FBI Terrorism Vulnerability SelfAssessment, the TVA identifies activities to be performed to reduce the risk of an attack and to
mitigate its consequences. These assessments typically use a combination of quantitative and
qualitative techniques to identify security requirements, including historical analysis of past
events, intelligence assessments, physical surveys, and expert evaluation. When the risk of
hostile acts is greater, these analyses may draw more heavily upon information from intelligence
and law enforcement agencies regarding the capabilities and intentions of the aggressors. The
following graphic portrays the process utilized by BART:
FTA-FL-26-71054-03
80
System Security Program
Security Policy
Security Plan
Security Procedures
Identify Critical Assets
Final Review/Assessm ent
Identify Threats to Assets
Threat Scenarios
Quantify Threats
Threat and
Vulnerability
Management
Im plem ent Controls
Design/Control
Recom m endations
Threat Analysis
Identify Standards and
Requirem ents
Identify Controls to Prevent/
Mitigate Vulnerabilities
Vulnerability Analysis
Identify Consequent
Vulnerabilities
Risk Managem ent
Threat and Vulnerability Management
A Threat and Vulnerability Resolution Matrix was used by BART to prioritize the threats and
vulnerabilities and identify the assets most at risk. Additionally, a scenario-based analysis was
used to help define the most vulnerable targets. At the conclusion of the scenario-based analysis,
BART developed a list of prioritized vulnerabilities that were documented in a confidential
report. Based on this list of prioritized vulnerabilities developed through the scenario analysis,
BART identified countermeasures to reduce those vulnerabilities.
Threat and Vulnerability Resolution Matrix
Frequency of
Occurrence
Vulnerability Categories
Catastrophic
1A
Frequent
1B
Probable
Occasional 1C
1D
Remote
Improbable 1E
Critical Marginal Negligible
2A
2B
2C
2D
2E
3A
3B
3C
3D
3E
4A
4B
4C
4D
4E
Unacceptable (Immediate Action Required)
Unacceptable (Management Decision Required)
Acceptable with Review by Management
Acceptable Without Review
FTA-FL-26-71054-03
81
For BART, the potential of system intrusions posed significant threats. As such, BART
developed a system of intrusion detection for high risk locations that is based upon a device for
the detection of an unauthorized individual and a means for confirming the presence of the
individual that helps to reduce the number of false alarms. The system has the ability to track the
movement of a person within the protected location. Police response to the location will be
directed to the last detected location and any need to restrict train service will be implemented.
In the ranking of vulnerability and severity, these are highest risk locations that a successful
attack would essentially eliminate a major portion of the service area. It is at these locations that
BART has initially implemented their intrusion detection system.
Many of the details of this intrusion detection system are inappropriate to identify in this
document (classified as Security Sensitive Information). BART has a police force dedicated
solely to the security of the BART system. The BART Police Department, Office of the Chief,
Counterterrorism/Criminal Intelligence/SWAT, should be contacted at (510) 464-7077 for
privileged information concerning this intrusion detection system.
This case study includes a general description of the functions provided by the intrusion
detection system and its development by BART. One of the requirements of such a system is
reliability. What could be considered false alarms in a rail rapid transit environment would soon
destroy the credibility and reliance upon the intrusion detection system (IDS) (which rarely, if
ever, occur, according to a representative of the BART Police Department. The IDS must also
be able to distinguish between trains, animals, debris and authorized personnel. Accomplishing
reliability and definition with such a system requires the interaction and cooperation between
engineering, rail operations, maintenance and police. The IDS was designed by BART
Engineering using essentially off-the-shelf electronics and devices based upon BART Police
performance criteria. Rail Operations currently provides the monitoring of the IDS and
notification to BART Police when an intrusion is detected. Maintenance was required to
establish procedures for the new equipment and configuration.
When an alarm is received in the Operations Control Center, the Central Manager observes the
status of the location monitored by the IDS to determine the validity of the alarm and whether or
not the persons are authorized to be at the location. If the persons are authorized, the alarm is
reset, but if not, BART Police is notified for response and the Central Manager provides the
instructions, if necessary, to secure BART personnel and trains from the location. If a positive
determination cannot be made from the information available, BART Police will be notified and
will respond accordingly.
Cost/Benefit Analysis
BART did not conduct a cost benefit analysis for the intrusion detection system. However, the
implementation of the IDS prevents BART from stationing guards or police officers to protect
the most vulnerable facilities and locations, a far less cost effective means of providing security.
In addition, this use of security employees could not been sustained over the long term due to
budget constraints.
FTA-FL-26-71054-03
82
As in any system safety, removing a hazard or, in this case, a threat from the system by means of
equipment design is almost always more effective than rules, procedures, or other human
measures in cost and performance.
Measure Effectiveness of Implementation/Performance Indicators
One of the measures of the effectiveness of safety and security at any transit system is patronage.
Currently, BART is at a high point in patronage. While much of the increased ridership could be
related to increases in fuel prices, the safety and security patrons experience while riding help
maintain current ridership and attracted new patrons. Choice riders are not likely to utilize a
transit system that is viewed as unsafe or unsecure. While the IDS is not visible or advertised to
the public, BART Police have shown they have increased security measures as complements to
the IDS system. Additional station security announcements and destination sign messages
provide warnings, alerts, instructions how to act when observing unusual behavior. In addition,
the stationing of uniformed officers on platforms and trains lends an increased level of safety and
security for patrons.
Lessons Learned/Conclusions
There are many challenges facing those who are responsible for making rail transit safe and
secure. There are means available to evaluate the threats and vulnerabilities that a rail transit
system faces. What is necessary to add to the mix of countermeasures is innovation and
technology. It is important for transit system to communicate and share information because
valuable time and money can be spent trying to “reinvent the wheel.” Sharing information about
accomplishments and failures will not only save money; more importantly, effective measures in
counterterrorism can be implemented to save lives and property.
BART used the threat and vulnerability matrix to prioritize their threats and vulnerability and
identify their assets most at risk. Additionally, a scenario based analysis was used to define the
most vulnerable targets. This approach allowed BART to identify counter measures to reduce
those vulnerabilities at high risk facilities and locations. The IDS provides constant monitoring
of access to these locations eliminating the need for additional security personnel.
Having the alarm directly in the Operations Control Center gives the Controllers the opportunity
to restrict train and maintenance operations from the area while simultaneously the BART Police
Dispatcher is being notified.
FTA-FL-26-71054-03
83
The level of implementation at the BART system will depend upon the level of funding made
available for security measures. Ultimately, BART would like to have the Intrusion Detection
System in all tube and tunnel locations.
FTA-FL-26-71054-03
84
SUMMARY AND CONCLUSION
In the wake of 9/11, extensive efforts have been taken to improve the security of public transit
industry. Special funds and grants have been allocated to conducted research to identify
innovative and effective approach to transit security. Despite the fact of understanding the
importance of safety and security, transit agencies face the problem of justifying the funds
needed for security. The challenge here is to utilize the funds in the most effective way. It is also
important to come up with innovative approach to deter terrorist activities or detect them in the
early stage to prevent large disruptions causing huge loss to lives and properties.
The case studies presented here provide insight into the best practices in the industry for design
and implementation of the security measures. The transit agencies selected have implemented
creative and innovative methods to improve security at transit operating facilities and passenger
stations without significant increases in their operating cost.
Regional Transportation District (RTD), Denver
Regional Transportation District (RTD) in Denver is one of the few transit agencies to include
safety and security in the planning and design phase of LRT capital projects. A design criteria
manual was initially developed in 1994 to serve as a guideline for all the LRT projects. Safety
and security are now included as a part of the design manual. RTD developed and modified these
safety and security design criteria’s as a result of lessons learned from earlier LRT projects,
safety design criteria from other agencies, results from security evaluations, and Threat and
Vulnerability Assessments (TVA). One of the primary goals of the manual was to provide
guidance to project engineers and architects for the initial inclusion of safety and security
requirements during the planning and design phases of RTD’s LRT projects.
The inclusion of safety and security requires a dedicated team to be committed for improving
safety and security including input from other department of the systems. The RDT’s Public
Safety Division is responsible for the agency’s safety and security requirements. The Public
Safety Division is broken down into sub-sections that include Safety, Environmental and
Security. The Division has 6 employees, 75 contracted security officers, and a contract with the
Denver Police Department to provide off-duty Police Officer security assistance. Although such
a large separate division may not be possible for all the transit agencies, it is recommended to
have a team or committee dedicated for developing security measures.
Currently, the security and safety criteria manual does not cover all the systems but it includes
criteria to have security measures implemented at stations, operations facility, fare collection
equipment, light rail vehicles, emergency access/egress locations, walkways and list of other
elements related facility design. It also includes specifications for the type of technologies to be
used as video surveillance equipment, emergency phones, and lighting systems into capital
projects. For example, the design manual runs into details of specifying video surveillance
systems to be capable of transmitting real-time (30 frames per second per camera) video to
RTD’s Security Command Center via a fiber optic transmission. These and other details helped
FTA-FL-26-71054-03
85
RTD to ensure standardization of technologies in the entire system. Design principles like
CPETD are also included the manual.
The approach followed by RTD is unique, as decisions for developing criteria for security and
safety include integration from departments other then safety and security. This approach allows
weakness to be identified planning phase and eliminated in the design phase rather then after
implementation.
Washington Metropolitan Area Transit Authority (WMATA)
WMATA took the nationwide lead in developing plans and procedures for response and
mitigation of a terrorist incident involving the use of weapons of mass destruction. After the
sarin attack in Tokyo in 1995, WMATA analyzed the devastation and economic consequences
that a chemical attack on mass transportation would have in the United States. WMATA
recognized the need for real time protection against subway attacks. It has developed a strong
team and a system (PROTECT) to effectively detect threat to safety and security and the
capability to respond accordingly. It is the first systems-based application developed to address
the complex problem of planning and integrating responses to emergencies, particularly those
involving different teams or agencies.
WMATA’s Communications Branch is responsible for the efficient, effective and economic
management of the Authority’s communications systems in support of Rail and Bus Operations,
e.g., telephone, mobile radio, public address, cable transmission, fiber optic, fire and intrusion,
rail yard security, closed circuit television, bus transfer dispensers, wayside/emergency
telephones, environmental monitoring, digital video recorders, and the PROTECT system.
WMATA has a Metro Transit Police to prevent crime, protect Metro’s customers, employees,
facilities and revenues and enforce laws, ordinances, rules and regulations. Its Emergency
Response Training Facility is the only transit facility in the nation that is available 24 hours per
day, 7 days a week to train emergency personnel. WMATA response is highly enhanced by
using PROTECT system and the response time is reduced from 35 minutes to 5 minutes. The
PROTECT system includes detectors that sense the chemical, verify it, estimate the magnitude of
the problem and initiates communication with the local emergency response team. It not only
initiates communication but also suggests the action to increase effectiveness and dramatically
reduces response time.
The PROTECT system includes detectors that sense chemical agents, video for incident
verification, a computer program to model the spread of contamination in the subway, aboveground flow modeling for dispersion of toxic materials from street vents and station exits and
wireless communication for emergency responders. When PROTECT is triggered, video
cameras verify the attack, alarms sound at the subway operation command center, and operators
are directed through a set of optimized responses shown on computer screens (e.g., photos,
facility maps, identification of the chemical agent and concentration, technical updates and
response procedures, weather and wind direction).
The PROTECT system in one of the best system in the nation for detecting chemical or
biological attack but its implementation cost is very high and requires support at federal, state
FTA-FL-26-71054-03
86
and local levels. But the approach certainly stresses transit agencies on understanding the
resources and training requirements to develop a very effective response system. Coordination
with local emergency responders is extremely important for the success of such an approach.
Charlotte Area Transit System (CATS)
Charlotte Area Transit System (CATS) very recently took a unique approach of including safety
and security with full system integration. It is one of a few transit systems that have implemented
strong security management measures, including security management and life safety systems
integration aimed at protecting passengers, employees, the general public and CATS’ physical
assets. CATS established an Office of Safety and Security utilizing Charlotte Mecklenburg
Police Department Off-Duty Police and contract security agencies. It also included hiring
security professionals to review its safety and security plans and develop safety and security
standards for the agency. Thus, it has taken steps to integrate various departments and utilize
their resources for common goal of increasing safety and security.
CATS has a System Security Plan that addresses how to integrate security into every aspect of
the agency. The CATS System Safety Program Plan (SSPP) is also under revision to include the
various corridor projects and system growth that CATS has experienced. Its Emergency
Response Plan addresses various agency roles and responsibilities in the event of an emergency
and it has been tested during recent drills and events.
In addition to improving security plans, CATS has implemented physical security management
solutions include:
•
•
•
•
•
•
Identification cards/key cards
Access control/security management
Fire/life safety system
Key/lock management
Facility video camera system
Perimeter security
One of the criteria for selecting the latest technologies was to ensure its compatibility with the
existing system. Also make sure that those technologies selected will allow for expansion
without becoming “outdated” prematurely. It was observed that it takes a great deal of energy to
successfully implement something of far reaching proportion and requiring the involvement of
many sections, especially technology, to actually complete the installation. To implement the
above measures CATS has spent considerable amount of time and effort in convincing the
employees to cooperative and change their perception for security. There was resistance from the
employees for installing video surveillance as they thought that they would be constantly
monitored. This and similar other issues were resolved by proper communication and awareness.
Massachusetts Bay Transportation Authority (MBTA), Boston
The MBTA Transit Police Department is the principal law enforcement agency for all personnel,
passengers, facilities, stations, properties, equipment, and vehicles within the MBTA service
FTA-FL-26-71054-03
87
area. All the officers are specially trained to function in a transit environment. In addition, they
have been trained in the National Incident Management System ICS training levels 100-700 and
all have received advanced training for identifying and managing incidents involving weapons of
mass destruction. In addition to its patrol operations, the Department’s specialized services
include intelligence operations, criminal investigation, crime analysis, detective services, field
training, K-9, special operations, community services, prosecution, motorcycle operations, and
explosive detection
MBTA Transit Police department’s seven-person Intelligence Unit has monitored continuously
information related to transit security from terrorism and other criminal activities. This approach
makes the Transit Police Department the state’s lead agency for transit security intelligence and
it acts like a statewide clearinghouse for this information.
MBTA’s Operations Control Center (OCC) is the central hub for all operations and safetyrelated communications. It was observed that there was no direct communication between OCC
and the MBTA Transit Police Department as they operated on different–and non-interoperable–
radio frequencies. Besides, the OCC was not secured and it had no back up for operation. Any
security breaches will bring the whole operation to a stand still. Recognizing the need to
prioritize effective communications and to protect communications personnel and assets, MBTA
took a very innovative approach to solve the problem. A new control center was proposed to
solve the problem of back up operation. Accommodating some police personnel in the OCC not
only increased the security at OCC but also increased the communication between them (OCC
and Transit Police Department). This kind of innovative approach substantially increases the
efficiency for response and does not entail huge cost. This approach certainly aligned well with
department’s strategic principle: “Cost-effective implementation through better use of
technology”–in this case, human technology. It is noteworthy that it neither required any
additional staff, nor any staff reductions. It did not require product training or technical
maintenance cost. It did, however, require that several policies and procedures be rewritten to
account for the new direct lines of communication.
Central Florida Regional Transportation Authority (LYNX), Orlando
With expanded service and new start light rail system LYNX came up with new facility called
the LYNX Central Station (LCS). Safety and security elements were not included in the initial
design but they were included prior to the beginning of the construction phase of the project.
The security system project was contracted directly through the security system vendor and not
through the construction contract to maintain a higher level of security integrity. It was also
recognized through this process that addressing security issues early during the design phase or
construction phases of most transit projects is critical. Also cost of implementation is lower is
considered in the design phase as compared to its implementation after construction.
LYNX had performed threat and vulnerability assessment (TVA) for LYNX LCS and came up
the technologies that should be used to increase the system safety and security. LYNX also
developed a formal security plan in 2003 that resulted in the formation of safety and security
division. Armed and unarmed offices will be included at all LYNX facility and it also entered a
FTA-FL-26-71054-03
88
verbal agreement with the Orlando police department to supply off duty officers at LYNX
facilities on a regular basis.
In addition to the operational security support, a new integrated security system was also
incorporated into the LCS building design. The system now includes cameras for all public
areas, bus areas, and perimeter entrances and exits. Electronic ID cards and electronically
control door contacts have been placed on all perimeter doors limiting access to non-public
areas. Entrance readers and a secondary Access Control System (ACS) device (bio-readers) are
used to prevent and control unauthorized persons from entering any area that contains money.
All the cameras and accessed controlled doors are electronically recorded in a CCTV control
room with staffed members of the contract security force to monitor it for 24 hours a day, 7 days
a week. In addition to providing latest security to the new facility, old ones are also retrofitted
with safety and security devices. The new LYNX Operation Center (LOC) will so be equipped
with similar technologies to integrate it will the other two facilities. All the facilities will be
monitored centrally from LCS control room.
It was observed with the LYNX new integrated system, there was significant increase in the
reported criminal activities. This was due to the accurate and efficient recording system. In the
future these measures will certainly help in reducing those criminal activities and improve safety
and security. It was also observed that security has been given great priority and a combined
effort is made to improve safety and security.
San Francisco Bay Area Transit District (BART)
The San Francisco Bay Area Transit District (BART) is recognized as being on the cutting edge
of rapid rail transit since the fully automated system began passenger service in1972. Automatic
Train Control (ATC) provides a failsafe train protection system and central supervisory
functions, including fully automated train operations and automatic schedule adjustment. The
Operations Control Center (OCC) provides supervision over all phases of operations, including
trains, patrons, system power, and wayside equipment.
Securing such a huge infrastructure from the risk of criminal activities or terrorist attacks was
extremely challenging considering the open accessibility to the system which is one of the
requirement for public transit systems. It is difficult to maintain adequate level of security
without affecting the flow of people in and out of the system. BART conducted an extensive
Threat and Vulnerability Assessment to identify and prioritize the assets that need high security.
Additionally, a scenario-based analysis was used to help define the most vulnerable targets. At
the conclusion of the scenario-based analysis, BART developed a list of prioritized
vulnerabilities that were documented in a confidential report. Based on the results of the
scenario analysis, BART identified countermeasures to reduce those vulnerabilities. Since it was
identified that system intrusion posed significant threats, BART developed a system of intrusion
detection for high risk locations that is based upon a device for the detection of an unauthorized
individuals. It also had a system to verify those intrusions to reduce the number of false alarms.
The unique IDS system is able to distinguish between trains, animals, debris and authorized
personnel with the integration of and cooperation among engineering, rail operations,
maintenance and police. The IDS system provides monitoring and notification to BART Police
FTA-FL-26-71054-03
89
in case of intrusion. It was observed that the reliability and efficiency of the system was
increased by integrating various departments in BART. The integration not only made the safety
and security system efficient but also reduced the response time and increased cooperation
among departments in case of emergency.
This research suggests that the system safety and security should be implemented at the design
and planning phase of the capital projects. Transit systems should spend considerable amount of
time and effort in developing safety and security plans. Transit agencies should conduct threat
and vulnerability assessment to understand their assets and the impact of terrorist attack or any
event causing disruption in the normal services. The capabilities and applications of the safety
and security technologies should be thoroughly understood by the transit agencies and used
according to their needs.
In addition to the research already done in the areas of safety and security, including this study,
several areas have been identified that need further research:
•
Performance measures for the safety and security measures implemented by a transit
agency should be developed. These performance measures will not only assist the
implementing agency to better understand its security system but also assist other
agencies in developing their own measures by serving as a benchmark.
•
It was observed that most of the agencies do not perform cost-benefit analysis. Though it
is difficult to accurately estimate the benefits of implementing security measures,
research in this area will help develop standards for estimating the benefits. Quantifying
the benefits will also create a sense of urgency among the transit agencies to make safety
and security a priority. Additionally, it will also help in justifying the fund requirements
by the agencies.
•
A decision making tool for transit agencies to understand the implementation cost of
safety and security devices should be developed. The tool should contain a list of
available technologies with their usage, capital cost, implementation cost, maintenance
cost, and useful life of each technology. The tool can eventually be updated to
incorporate the latest technology in the market. This tool should enable the agencies to
select different alternatives to find the implementation cost and help the agencies make
decision that best fits their budget.
•
Research to explore innovative ways to finance security projects should be conducted.
This would help agencies to overcome their funding requirements.
In general, safety and security are everybody’s responsibility, and awareness and training will
enhance it. Best practices and innovative approaches in the industry should be studied and used
by the other transit agencies in their planning and implementation.
FTA-FL-26-71054-03
90
REFERENCES
American Public Transportation Association. 2004. “Survey of United States Transit System
Security Needs and Funding Priorities: Summary of Findings.” Washington, DC: APTA.
Borum, R., Fein, R., Vossekuil, B., & Berglund, J. 1999. “Threat Assessment: Defining an
Approach for Evaluating Risk of Targeted Violence.” Behavioral Sciences & the Law 17(3).
Borum, R., Fein, R., Vossekuil, B., & Gelles, M. 2003. “Profiling Hazards: Profiling in
Counterterrorism and Homeland Security.” Counterterrorism and Homeland Security Reports
10(4) 1.
Dietz, P., & Martell, D. 1989. “Mentally Disordered Offenders in Pursuit of Celebrities and
Politicians. Final Report.” Washington, D.C.: National Institute of Justice.
Fein, R. A., & Vossekuil, B. 1998. “Protective Intelligence and Threat Assessment
Investigations: A Guide for State and Local Law Enforcement Officials.” NIJ/OJP/DOJ
Publication No. NCJ 170612. Washington, DC: U.S. Department of Justice.
Government Accountability Office. December 2002. “Mass Transit: Federal Action Could Help
Transit Agencies Address Security Challenges.” GAO-03-263. Washington, DC: GAO.
Government Accountability Office. 2002. “Mass Transit: Challenges in Securing Transit
Systems.” GAO-02-1075T. Washington, D.C.
Transportation Research Board. 2002. Deterrence, Protection, and Preparation: The New
Transportation Security Imperative. Washington, DC: Transportation Research Board, National
Academy of Sciences.
MBTA Transit Police Department, http://www.transitpolice.us/
MBTA Transit Police Department. June 2003. “The Plan of Action: A Commitment to
Excellence.” Boston, MA: MBTA Transit Police Department.
MBTA Transit Police Department. November 2003. “Securing the MBTA: A Strategy for
Homeland Security.” Boston, MA: MBTA Transit Police Department.
Meyer, M. 2002. “The Role of Metropolitan Planning Organizations in Preparing for Security
Incidents and Transportation Response.” Atlanta, GA: Georgia Institute of Technology.
NIMS Online, http://www.nimsonline.com/nims_faq.htm#incident
FTA-FL-26-71054-03
91
NOTICE
This document is disseminated under the sponsorship of the
Department of Transportation in the interest of information exchange.
The United States Government assumes no liability for its contents or use thereof.
The United States Government does not endorse products or manufacturers.
Trade or manufacturers' names appear herein
solely because they are considered essential to the object of this report.
FTA-FL-26-71054-03
92
Download