Skip to main content

Currently Skimming:

3 Protecting Critical Infrastructure
Pages 41-68

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 41...
... economy would be several million dollars per day.2 Holmes and his colleagues are obviously very concerned about critical infrastructure security, including chemical facilities. Securing Chemical Facilities: Recent American Experiences and Lessons Learned Nancy Jackson provided context for her comments by stating that Sandia National Laboratory conducted the first post-September 11, 2001 (9/11)
From page 42...
... "Tokyo 1995 Sarin Attack: Aum Shinrikyo Cult Trial Ends." BBC News Asia, November 21, 2011. Available at: http://www.bbc.com/news/world-asia-1581 5056; accessed October 16, 2014.
From page 43...
... In addition, following the explosion, there was some suspicion that there had been attempted 6 Society of Chemical Manufacturers and Affiliates. "About Chemstewards." Available at: http://www.socma.com/chemstewards/; accessed September 22, 2014.
From page 44...
... One may conduct a laptop exercise to determine what might happen if someone broke in. At the other end of the spectrum is performance testing, which involves the facility and the facility security personnel performing their duties in response to mock security threats, which may include force-on-force exercises (with no live fire)
From page 45...
... "India Chemical Industry: Five Year Plan – 2012-2017." Available at: http://planningcommision.gov.in/aboutus/committee/wr kgrp12/wg_chem0203.pdf; accessed October 16, 2014. 8 These zones are called Petroleum, Chemicals and Petrochemicals Regions. 
From page 46...
... "M.B. Lall Committee Report, Independent Inquiry Committee Report on Indian Oil Terminal Fire at Jaipur." Available at: http://oisd.gov.in/; accessed October 16, 2014.
From page 47...
... Available at: http://www.thehindu.com/thehindu/2003/03/ 09/stories/2003030905340200.htm; accessed October 17, 2014. 11 Ministry of Road Transport and Highways, Government of India.
From page 48...
... A company that makes a product wants to produce it safely and securely, 15 Ministry of Environments and Forests, Government of India. "Manufacture, Storage and Import of Hazardous Chemical Rules, 1989." Available at: http://enfor.nic.in/legis/ hsm/hsm2.html; accessed October 17, 2014.  16 Trindal, Joseph.
From page 49...
... Cutting costs without analyzing its effect on process safety was one of the root causes of the Bhopal disaster.17 How does one convince management of perhaps the largest challenge after a security VA or a risk assessment of product safety? How does one convince top management that this is necessary?
From page 50...
... "Investigation Report: Refinery Explosion and Fire (15 Killed, 180 Injured) , BP, Texas City, Texas, March 23, 2005." Available at: http://www.csb.gov/assets/1/19/CBSFinalReportBP.pdf; accessed October 17, 2014.
From page 51...
... Available at: http:// www.ilo.org/dyn/natlex/docs/WEBTEXT/32063/64873/E87IND01.htm#a085; accessed October 17, 2014.
From page 52...
... Yadav dedicated his talk to the mo than 20 ch ood n ore hildren who died from contaminated food in an incid w c f dent in Chapra Bihar, in 201 a, 13. He beg by making distinctions among food s gan g safety, food deefense, and foood security Food safety encompasses the efforts to p y.
From page 53...
... The complex nature of the food supply, with many inputs and outputs, makes it particularly vulnerable to intentionally introduced contaminants. Furthermore, such incidents of contamination may easily spread across international boundaries because in the 21st century, the food supply chain is truly global.
From page 54...
... "School Meal Kills 22 in India Bihar State." BBC News Ind BC K a's " dia, July 17 2013. Available at: http:// 7, /www.bbc.com/ /news/world-asi a-india-2333744 45; accessed October 17, 2014.
From page 55...
... Yadav then provided specific examples of EMA events. In 1995, unapproved pesticides were used that entered the food supply via cereal, causing $140 million in loss of sales.28 In 2004, there was an incident in which unapproved dyes were used in Indian spices, which resulted in a recall and the loss of 27 Shenon, P
From page 56...
... Yadav noted that the food supply is vulnerable to cyberattacks as well. Some food companies rely on computer systems to control food manufacturing processes.
From page 57...
... It is important to understand that heightened interest by the public and media requires special consideration when developing risk communica tion messages. In conclusion, Yadav summarized his remarks by stating that there is a broad spectrum of nontraditional threats to the food supply chain, and it is possible to cause significant public health and economic impact from intentional contamination.
From page 58...
... The food supply is global, and experts must work together to reduce and minimize the risk and impact of an incident of intentional contamination. Securing Plants, Animals, and Crops in India Abraham Verghese specifically addressed the threat to agricultural crops from invasive species entering India mostly in an unplanned manner.
From page 59...
... "The Relationships Between the Indian Botanic Garden, Howrah and the Royal Botanic Gardens, Kew in Economic Botany." Royal Botanic Gardens Website. Available at: http://www.kew.org/collections/ecbot/pages/wp-content/media/papers/hasti ngs1986howrah.pdf; accessed October 20, 2014.
From page 60...
... How should we assess the tradeoffs in terms of how good the security and safety have to be for us to agree that it is good enough? Yadav replied that in the food supply in the United States, all industries are governed by a regulatory body that enforces regulation and the expected outcomes of the food industry.
From page 61...
... If it is, this is considered food safety. Food defense deals with intentionally introduced substances that are not part of the food supply chain, such as anthrax.
From page 62...
... A terrorist may intentionally introduce a naturally occurring contaminant into the food supply chain to avoid detection or suspicion. Likewise, terrorists may not always be looking for maximum casualties.
From page 63...
... Maurya affirmed that India also takes the human side of aviation security, and particularly insider threats, very seriously, and said several steps have been taken to address this potential problem. Recent Experience with Averted Power Failure in Silicon Valley Michael O'Brien began by noting that, historically, critical energy infrastructure in the United States has operated in a low-threat environment.
From page 64...
... At any facility, one also needs to have an effective insider protection program to promote security culture. Identification of critical facilities and understanding cascading effects of attacks, he said, are key to defining consequences, as is deployment of protection strategies that integrate human and technology elements to mitigate risk.
From page 65...
... Identify your problems. Conducting a security assessment enables the security manager to focus on the most important problems and to justi fy use of funds to address those problems.
From page 66...
... SOURCE: Natio t s onal Oceanic an Atompheric A nd Administraation. Available at: http://www..ioos.noaa.gov/gllobal/geo_global l_hfr_mar2012.p pdf; accessed October 9, 201 d 14.
From page 67...
... Protecting Critical Infrastructure 67 9. Coordination and cooperation are critical.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.