International Studies Journal (ISJ)

International Studies Journal (ISJ)

Investigative the lack of the US Government in Dealing with Industrial Terrorism

Document Type : Original Independent Original Article

Authors
1 Associate Prof. at Industrial Engineering Dep., Faculty of Industrial Engineering, Parand Branch, Islamic Azad University, Parand, Iran.
2 Ph.D. of Industrial Engineering, Parand Branch, Islamic Azad University, Parand, Iran.
Abstract
Studying the evidence and findings obtained from the research shows that one of the aspects of terrorism, attacking industrial infrastructure, has negative and destructive effects on the economic prosperity of a country. Therefore, the main goal of the current research is to investigate the success rate of the American government in controlling the effects of terrorism on industrial activities in the case study of the American Railway Company; therefore, the current study examines terrorism from the perspective of its effect on industrial activities and tries to do so systematically. To answer this question, has the US government been successful in dealing with industrial terrorism? The hypothesis of the present research intuitively states that the American government is incompetent in dealing with industrial terrorism, and therefore, to test the hypothesis, it is focused on Amtrak (American Railway Company). This research, using the method of content analysis, has explained the inadequacies of the government in dealing with its consequences for systematically and generalizing industrial terrorism in America. Some results of this study show that the economic value of parent industries and the control measures of the American government to protect these industries are directly related to industrial terrorism, and finally, the consequences of industrial terrorism for some parent American industries such as railways lead to political instability, capital reduction and Public trust has resulted.

Highlights

Introduction

From the perspective of industrial governance, industrial terrorism refers to various types of planned attacks and violence. Specific and opposing groups carry out these attacks to affect a country's important industrial, commercial, and vital purposes. These attacks can seriously disrupt the sensitive industrial infrastructure of that country.

 Considering the 10% increase in the demand for cargo and passenger transport in the American nationwide rail network and the existence of numerous security holes in it, such as easy accessibility and vulnerability of stations and rail lines; Making extensive investments to improve the security level of the rail network by the American government, especially in the field of recent rail technologies, has become essential.

Despite the technical and engineering recommendations of security experts in the United States, the amount of investment and preventive measures to improve the security of the rail transportation sector. Compared to other modes of transportation such as air transportation in this country is very small.

Therefore, the management of American rail security has faced many difficulties, and this shows that the governing policies of the American government to maintain the protection of the country's vital infrastructure are weak. Considering the geographic dispersion of the American rail infrastructure, its ease of access by attackers, and its vulnerability to planned vandalism. The main purpose of the current research is to investigate the inadequacies of the American government to maintain critical infrastructure against security crises. This is done in a case study of the American nationwide rail network.

 

Methodology

The present research was conducted using the content analysis method. For this research, five general dimensions have been considered to examine the resilience of America's critical infrastructure based on its strengths and weaknesses. Each of these categories includes a dimension of security applications in the critical infrastructure of the US rail network. The items related to each category in the documents and security content about the American rail infrastructure have been collected and recorded for comparison.

The categories examined in this research are: First: Collecting data and providing information about the current state of the American rail infrastructure and drawing invisible realities in the security of the American infrastructure. Second: Studying the weaknesses and inadequacies related to the railway infrastructure Third: showing how the system's defences work against intruders. Fourth: organizing, summarizing, and combining information. Fifth: Summary of experiences. The statistical population in this research consisted of security and cyber defence documents, reports, and texts of the last 15 years of the United States in the fields related to railway infrastructure. Due to the large volume of documents, only the sections for infrastructure security (fleet, stations, and railway lines) were selected and analyzed.

 

Results and Discussion

A wide range of active attacks on American national railways can be imagined, and the occurrence of them can have significant negative effects on the control operations of train fleets in this country's rail network. According to the findings of the research on the chain of attacks on the rail network. At one end of the chain, there are active attacks that can easily destroy the possibility of any information exchange between the entities of the entire system. This includes blocking all the communication channels of the network. At the other end of this chain are passive attacks that result from intruders' detailed understanding of rail system security breaches. In this type of attack, attackers block the existing channels by exploiting the weaknesses in the communication protocols and using the “denial” technique, which makes it difficult to invalidate data. Other active attacks on the American rail network are mainly from security weaknesses in networks and computer systems. Such as security holes on the sender side, tampering with identity information by unauthorized users, or computer weaknesses on the receiver side, such as malicious and unprotected communication networks., social engineering, or gaining the trust of users, by holding a meeting with a valid recipient, etc., the National Railway of America pursues its goals.

 

Conclusion

The results of the document review and analysis show that the rail transport industry and the US government have taken very important steps to increase the safety and security of the rail network. However, as a significant target, the US rail transportation network remains vulnerable to attacks and potential consequences. Some of these attacks resulted in heavy damages and significant human casualties, among which we can mention the bombing of American railroads and railroad cars. Increasing the resilience of the US rail network against all types of possible attacks requires a lot of costs. It is therefore necessary to rely on accurate and comprehensive information about protection and safety against risks to reduce the success rate of sabotage attacks. Other results show that despite opportunities for improvement, little effort has been made by the federal government to use other options to transport chemicals and reduce hazardous shipments by rail across the country.

Keywords

Subjects


  1. Banks, W. E., & Barclay, R. P. (2006). An Analysis of a Strategic Rail Corridor Network (STRACNET) for National Defense (No. MTMC-RND-76-1).
  2. Bergen, P., & Hoffman, B. (2015). Assessing the terrorist threat. A report of the bipartisan policy center’s national security preparedness group, 6.
  3. Berrick, C. A., & Hecker, J. (2006). Passenger Rail Security: Enhanced Federal Leadership Needed to Prioritize and Guide Security Efforts. DIANE Publishing.
  4. Chittester, C. G., & Haimes, Y. Y. (2014). Risks of terrorism to information technology and to critical interdependent infrastructures. Journal of Homeland Security and Emergency Management, 1(4).
  5. Hartong, M., Goel, R., & Wijesekera, D. (2016, May). Communications based positive train control systems architecture in the USA. In 2006 IEEE 63rd Vehicular Technology Conference (Vol. 6, pp. 2987-2991). IEEE.
  6. Hartong, M., Goel, R., & Wijeskra, D. (2013). Secure Rail Interchange Routing.
  7. Jenkins, B. M., Butterworth, B. R., & Shrum, K. S. (2010). Terrorist attacks on public bus transportation: A preliminary empirical analysis.
  8. Jeong, D. Y., Tang, Y. H., & Perlman, A. B. (2011). Evaluation of semi-empirical analyses for railroad tank car puncture velocity, part 1: correlations with experimental data (No. DOT-VNTSC-FRA-99-9). United States. Federal Railroad Administration.
  9. Jeong, D. Y., Tang, Y. H., Yu, H., & Perlman, A. B. (2016, January). Engineering analyses for railroad tank car head puncture resistance. In ASME International Mechanical Engineering Congress and Exposition (Vol. 47780, pp. 1-7).
  10. Kissane, D. (2017, June). Terror on the TGV? The Terrorist Threat to France's High Speed Train Network. In The Terrorist Threat to France's High Speed Train Network (June 20, 2007).'Contemporary Challenges and Future Trends in International Security’Conference, Paris, France.
  11. Markoff, J. (2013). A silent attack, but not a subtle one. New York Times, 160(55176), 6.
  12. Maurillo, D. R. (2015). High-speed rail in the us: will it be a more attractive terror target than inter-city rail? (Doctoral dissertation, Master’s thesis, San Jose State University).
  13. Orr, M. F., Kaye, W. E., Zeitz, P., Powers, M. E., & Rosenthal, L. (2011). Public health risks of railroad hazardous substance emergency events. Journal of occupational and environmental medicine, 94-100.
  14. Ortiz, D. S., Weatherford, B. A., Greenberg, M. D., & Ecola, L. (2011). Improving the safety and security of freight and passenger rail in Pennsylvania.
  15. Plant, J. F., & Young, R. R. (2010). Securing and protecting America's railroad system: US railroad and opportunities for terrorist threats. Harrisburg: Pennsylvania State University.
  16. Role, C. F. (2019). HIGH SPEED PASSENGER RAIL.
  17. Schweizerische, S. N. V. (2016). Information technology-Security techniques-Information security management systems-Requirements. ISO/IEC International Standards Organization.
  18. Slovic, P. (2012). Terrorism as hazard: a new species of trouble. Risk analysis.
  19. Strandberg, V. (2016). Rail bound traffic—a prime target for contemporary terrorist attacks?. Journal of Transportation Security, 6, 271-286.
  20. Strandh, V. (2018). Preparing and responding to mass-casualty terrorist attacks: a comparative analysis of four terrorist attacks targeting rail bound traffic. International Journal of Emergency Management, 11(3), 262-281.
  21. Strandh, V. (2020). Exploring vulnerabilities in preparedness–rail bound traffic and terrorist attacks. Journal of Transportation Security, 10(3-4), 45-62.
  22. Turégano-Fuentes, F., Pérez-Díaz, D., Sanz-Sánchez, M., & Ortiz Alonso, J. (2018). Overall asessment of the response to terrorist bombings in trains, Madrid, 11 March 2004. European Journal of Trauma and Emergency Surgery. 34. 433-441.
  23. Vanderau, J. M., & Haakinson, E. J. (2009). An Evaluation of the Proposed Railroad VHF Band Channel Plan. US Department of Commerce, National Telecommunications and Information Administration.
  24. Wilson, J. M. (2017). Securing America's passenger-rail systems (Vol. 705). Rand Corporation.