The surface transportation system is vital to our nation's economy, defense, and quality of life. Because threats against the system have hitherto been perceived as minor, little attention has been paid to its security. But the world is changing, as highlighted by dramatic incidents such as the terrorist chemical attack on the Tokyo subway in 1995. As a consequence, security concerns are now attracting more attention—appropriately so, for the threat is real, and responding to it is hard. Although the surface transportation system is remarkably resilient, it is also open and decentralized, making a security response challenging. Research and development can contribute to that response in important ways.
Some important themes emerge from analysis of this strategy. First, a dual-use approach, in which security objectives are furthered at the same time as other transportation goals, can encourage the implementation of security technologies and processes. Second, modeling could be used more to develop a better understanding of the scope of the security problem. Third, DOT can play an important role in developing and disseminating information about best practices that use existing technologies and processes, including low-technology alternatives. Finally, security should be considered as part of a broader picture, not a wholly new and different problem but one that is similar and closely connected to the transportation community's previous experience in responding to accidents, natural disasters, and hazardous materials.
Transportation Research Board and National Research Council. 1999. Improving Surface Transportation Security: A Research and Development Strategy. Washington, DC: The National Academies Press. https://doi.org/10.17226/9689.
|1 Introduction and Background||3-12|
|2 Assessing Vulnerability||13-27|
|3 Establishing a Research and Development Strategy||28-42|
|4 Applying the Methodology: Some Specific Research and Development Topics||43-60|
|5 A Vision for the Future||61-63|
|Appendix A: Background on Systems Theory||67-70|
|Appendix B: The Likely Course of Development of Chemical and Biological Attacks||71-73|
|Biographical Sketches of Committee Members||74-78|
The Chapter Skim search tool presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter. You may select key terms to highlight them within pages of each chapter.
The National Academies Press (NAP) has partnered with Copyright Clearance Center's Rightslink service to offer you a variety of options for reusing NAP content. Through Rightslink, you may request permission to reprint NAP content in another publication, course pack, secure website, or other media. Rightslink allows you to instantly obtain permission, pay related fees, and print a license directly from the NAP website. The complete terms and conditions of your reuse license can be found in the license agreement that will be made available to you during the online order process. To request permission through Rightslink you are required to create an account by filling out a simple online form. The following list describes license reuses offered by the National Academies Press (NAP) through Rightslink:
Click here to obtain permission for the above reuses. If you have questions or comments concerning the Rightslink service, please contact:
Rightslink Customer Care
Tel (toll free): 877/622-5543
To request permission to distribute a PDF, please contact our Customer Service Department at 800-624-6242 for pricing.
To request permission to translate a book published by the National Academies Press or its imprint, the Joseph Henry Press, pleaseclick here to view more information.