Security and CIP — Background
In 1996 the Clinton administration, via Executive Order 13010, identified
8 infrastructures critical to the physical and economic security of the
U.S. — Electrical Power; Gas and Oil Production, Storage and Delivery;
Telecommunications; Banking and Finance; Water Supply Systems; Transportation;
Emergency Services; Government Operations. In May 1998, the President
issued two Decision Directives (PDDs 62 and 63) to protect critical infrastructure
against physical and cyber terrorism. Measures were to be put in
place so that interruptions to federal, state, local government and private
sector operations would at worst be “brief, infrequent, manageable, geographically
isolated, and minimally detrimental” to national welfare.
The post-September2001 security environment lends new urgency to this,
and Critical Infrastructure Protection (CIP) is now a priority that
DOTs have to balance against transportation performance and economic efficiency.
We take a broad view of CIP, arguing that the considerable costs of protection
— balanced against the very small likelihood that any one measure will
actually thwart an attack — are best justified by benefits in other areas,
such as mitigating accidental or natural events, or improving traffic flow
on congested roads. Conversely, technologies and initiatives developed
for other applications such as ITS could achieve some of the intended functions
of CIP, thereby limiting CIP expenditures (e.g. closed circuit cameras
on highways: it ITS parlance it's “monitoring,” in CIP it's “surveillance”).
Transportation infrastructure includes, for our purposes:
-
road, rail, air and waterway infrastructure
-
pipelines
-
terminals, intermodal facilities and warehouses
-
delivery systems
-
control systems
-
special needs of hazardous and non-hazardous materials in transit