Skip to main content

Currently Skimming:


Pages 3-11

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 3...
... 3 C H A P T E R 1 Risk Risk in the broadest sense is defined as "the possibility of loss or injury." When an asset or something of value is identified as "at risk" there is a presumption that the asset has been placed in a state or condition that creates or suggests the chance of loss or peril. In the public transit environment the most significant assets are the passengers who use the system, the employees who deliver the transportation services, and indirect participants who interface with transit systems such as station vendors, other building tenants or occupants, delivery persons, or those with homes or businesses in proximity to transit facilities or infrastructure.
From page 4...
... 4 Policing and Security Practices for Small- and Medium-Sized Public Transit Systems Set Security Goals Elements of Critical Infrastructure Prioritize Continuous Improvement to enhance protection of CI/KR Physical Cyber Human Implement Protective Programs Measure Effectiveness Feedback loop Identify Assets, Systems, Networks, and Functions Assess Risks (Consequences, Vulnerabilities, and Threats) Figure 1.1.
From page 5...
... Security Risk Management and Assessment Processes 5 Security Risk Security Risk consists of the much narrower category of possible loss events that result from the intentional harmful acts of other persons. It requires an actor, motivation to do harm, and to constitute actual risk, there must be a capability or opportunity to accomplish the adverse act.
From page 6...
... 6 Policing and Security Practices for Small- and Medium-Sized Public Transit Systems Specific to public transit, terrorist attacks have been launched directly against intercity and over-the-road buses, subways, elevated trains, passenger trains, trolleys, ferries, and other types of conveyances. Stations and depots have been targeted and right-of-way infrastructure including rail and highway bridges and tunnels have all been attacked and are considered by experts to be high-value attractive assets.
From page 7...
... Security Risk Management and Assessment Processes 7 the aviation, mass transit, highway, pipeline, and freight rail modes abroad. TSA-OIA is not aware of any attack planning against these modes in the Homeland.
From page 8...
... 8 Policing and Security Practices for Small- and Medium-Sized Public Transit Systems State and local police agencies who are responsible for recording crime rates typically do not categorize crime incidents by industry sector, markets, or commodity. The FBI, the national repository for crime statistics, also cannot distinguish whether a criminal incident occurred inside a transit vehicle, on a city street, or in a shopping mall.
From page 9...
... Security Risk Management and Assessment Processes 9 Property Crime Property Crime -- In the FBI's UCR Program, property crime includes the offenses of burglary, larceny-theft, motor vehicle theft, and arson. The object of the theft-type offenses is the taking of money or property, but there is no force or threat of force against the victims.
From page 10...
... 10 Policing and Security Practices for Small- and Medium-Sized Public Transit Systems The following information provides the commonly reported crimes occurring in public transit systems. The definitions of offenses were obtained from either National Transit Database (NTD)
From page 11...
... Security Risk Management and Assessment Processes 11 Trespassing -- Trespassing, as it relates to mass transit, is defined as the unauthorized entry of transit-owned land, structure, or other real property not intended for public use. Trespassing can result in serious harm or injury to passengers, especially if the trespassing involves entering a transit vehicle or right-of-way.

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.