Logo


1. Transportation Security
2. Bridge and Tunnel Vulnerability Assessments

3. Highway Vulnerability Assessment

Countermeasures

If the process of prioritization and risk assessment leads to the conclusion that a given bridge or tunnel must be made more secure, there are a variety of countermeasures that can be used singly or in combination to reduce attractiveness and/or vulnerability, or to reduce consequences if an attack occurs. Countermeasures are often grouped into actions or technologies to deter attack, deny access, detect presence, defend the facility, or design structural hardening to minimize consequences to an accepted level. Because of its expertise, the BRP dealt primarily with the last category of countermeasures. The panel’s focus does not imply that other strategies for deterring, detecting and denying, or defending are not valid options. In many cases, risk assessment as recommended here will lead to the conclusion that one or more of the non-design countermeasures is the most appropriate and cost-effective solution for a given facility. There are relatively mature technologies and strategies currently available for implementation. Application of these countermeasures still requires enabling funding but not necessarily the research and analysis commitment necessary to develop and implement effective design countermeasures.

Planning and coordination measures

Update the emergency operations plan/crisis management plan to include response and recovery to a terrorist threat involving a bridge. Based on the Federal Emergency Management Agency (FEMA) guidelines, the plan should include the following:

  • Concept of operations
  • Coordinated response, responsibilities, and liaisons among different departments and agencies
  • Sequence of events that should occur for an effective response
  • List of potential areas of vulnerability
  • Procedures for notification and activation of crisis management teams
  • Establishment of a mobile command center with essential communications equipment
  • Designated radio frequencies for emergency communications
  • Procedures for dealing with bomb threats and suspicious objects
  • Evacuation and shutdown procedures
  • Identification of emergency evacuation routes and staging areas for response teams
  • Measures ensuring safety and security after an incident
  • Procedures for restoring service and establishing alternate routes
  • Removal plan for damaged equipment and structural elements
  • Procedures for issuing information and reassuring the public
  • Procedures for dealing with victims and notification of relatives
  • Regular updates based on events that identify vulnerabilities in the plan
  • Communication and coordination with local, state, and federal law enforcement agencies to obtain terrorism intelligence, training, and technical support
  • Regular drills, tabletop exercises, no-notice responses, and full-scale simulations aimed at specific objectives to identify problem areas and test response procedures, communication, and coordination
  • Plans for rapid debris removal and repairs
  • Development of a training plan for maintenance personnel (observant of surroundings and knowing how to deal with suspicious objects)
  • Establishment of a security policy

Information control measures

  • Review and sanitize websites for potential information that may be beneficial to terrorists. However, removal of data from websites must be balanced with the need for information sharing. For example, information about a specific bridge can be very useful for identifying weaknesses and planning an attack, but general design guidelines and “standard” plans generally provide information that is not directly beneficial to terrorists.
  • Establish a common classification system for sensitive information. Implement procedures for the control of sensitive information, including document classification, disposal of sensitive materials, and tracking the distribution of design information to contract tenderers. Establish “need-to-know basis” procedures for the release of vulnerabilities, security measures, emergency response plans, or structural details for specific bridges.

Site layout measures

  • Improved lighting with emergency backup (combined with elimination of hiding spaces below)
  • Clearing overgrown vegetation to improve lines of sight to critical areas
  • Creative landscaping with regular maintenance to increase standoff distance to critical areas
  • Elimination of access to critical areas (beneath deck, maintenance rooms with access to cables, etc.)
  • Elimination of parking spaces beneath bridges
  • Providing pass-through gates in concrete median barriers to enable rerouting of traffic and access for emergency vehicles
  • Review of locations of trashcans or other storage areas that could be used to conceal an explosive device, ensure they are not near critical areas

Access control/deterrent measures

  • Police patrol and surveillance
  • Guards
  • Enhanced visibility
  • Signs issuing warnings that property is secured and being monitored
  • Marked vehicles
  • Keyless entry systems
  • Exterior and interior intrusion detection systems
  • Boundary penetration sensors (below bridge)
  • Volumetric motion sensors (for towers, maintenance buildings, inside box girders, etc.)
  • Point sensors (critical connections)
  • CCTV placed where it cannot be easily damaged or avoided while providing coverage of critical areas (to monitor activity, detect suspicious actions, and identify suspects)
  • Incorporation of a higher level of identification procedures and credentials for maintenance personnel, security personnel, and external contractors
  • Denied/limited access to critical structural elements (i.e., providing fencing around cable anchors, restricting access to box girders and cable towers, etc.)
  • Denied/limited access to inspection platforms
  • Physical barriers to protect piers
  • Physical barriers to control access to the deck during credible threats to a specific bridge (used in conjunction with random vehicle searches)
  • Rapid removal of abandoned vehicles
  • No fly zones around critical bridges
  • Emergency telephones to report incidents or suspicious activity
  • Use of an advanced warning system, including warning signs, lights, horns, and pop-up barricades to restrict access after span failure (manually activated or activated by span failure detectors)

Retrofit Options

  • Reinforcing welds and bolted connections to ensure that members reach their full plastic capacity (designed for 120% of connected member capacity to account for strength increases during high-rate straining)
  • Using energy absorbing bolts to strengthen connections and reduce deformations
  • Adding stiffeners and strengthening lateral bracing on steel members to prevent local buckling before they reach their full plastic capacity
  • Designing portions of the deck to “blow out” and create a vent to reduce pressures on the support structure (possibly near the abutments where large pressures build up from confinement effects)
  • Adding Carbon Fiber Reinforced Polymer (CFRP) hoop wraps on concrete columns, which can be reinforced with longitudinal wraps, to enhance concrete confinement, increase bending resistance and ductility, and add protection against spalling (can also be used on bents and beams)
  • Strengthening the lower portions (or full height) of columns against impacts and localized blast damage by encircling them with a steel casing (connected with high strength bolts and epoxy or a layer of grout)
  • Adding lateral bracing to columns to allow them to develop plastic hinges while preventing buckling
  • Adding 360-degree pier protection for impacts and standoff distance — possible alternatives include concrete barriers, stationary fender systems, dolphins, rotational bumper systems, or elastomeric energy absorbers
  • Restraining sections of the bridge with steel cables to reduce the chance of deck collapse at the supports, including cable supports to keep the deck from separating at the joints and hinge restrainers to hold the deck to the columns (can also be accomplished with high-strength threaded rod restrainers and pipe seat extenders)
  • Increasing the size of abutment seats and adding hinge seat extensions under expansion joints to reduce the chance of deck collapse at the supports
  • Increasing footing size (possibly combined with adding additional pilings in the ground or using steel tie-down rods to better anchor the footings to the ground) to improve resistance to cratering and large column deformations
  • Wrapping the lower portions of cables on cable-stayed bridges and suspension bridges with CFRP or other types of protective armor to protect against damage from blast and fragmentation
  • Increasing standoff distance and reducing access to critical elements with structural modifications (extending cable guide pipe length, moving guard rails, etc.)
  • Including reinforcing steel on top and bottom faces of girders to increase resistance to uplift forces from blasts that are in the opposite direction from those due to gravity and live loads
  • Providing system redundancy to ensure alternate load paths exist (through continuity, strengthening of connections, redundancy in cables and girders, etc.) should a critical structural element fail or become heavily damaged as a result of a terrorist attack
  • Strengthening the deck on curved steel trapezoidal girder bridges to ensure that sufficient torsional strength is provided should a portion of the deck be compromised

To receive your Draft Bridge or Tunnel Vulnerability Assessment , please submit your payment of $99.00


Business Name:
Contact Information:
Email Address:
Location to be Assessed:
  

Other members of our business group:
Cloud-Security.us | US-scada.com

COPYRIGHT (C) 2000 - 2013 InfoSecPro.com ALL RIGHTS RESERVED