Muutke küpsiste eelistusi

Risk Assessment and Security for Pipelines, Tunnels, and Underground Rail and Transit Operations [Kõva köide]

(RAMCO Companies, Inc., Ventura, California, USA)
  • Formaat: Hardback, 414 pages, kõrgus x laius: 234x156 mm, kaal: 703 g, 103 Tables, black and white; 39 Illustrations, black and white
  • Ilmumisaeg: 03-Jun-2014
  • Kirjastus: CRC Press Inc
  • ISBN-10: 1466569328
  • ISBN-13: 9781466569324
Teised raamatud teemal:
  • Formaat: Hardback, 414 pages, kõrgus x laius: 234x156 mm, kaal: 703 g, 103 Tables, black and white; 39 Illustrations, black and white
  • Ilmumisaeg: 03-Jun-2014
  • Kirjastus: CRC Press Inc
  • ISBN-10: 1466569328
  • ISBN-13: 9781466569324
Teised raamatud teemal:
Risk Assessment and Security for Pipelines, Tunnels, and Underground Rail and Transit Operations details a quantitative risk assessment methodology for systematically analyzing various alternatives for protecting underground rail, oil and gas pipelines, pipeline freight transportation, and other tunnel systems from terrorism threats and other disasters. It examines the engineering, environmental, and economic impacts and addresses both direct and collateral damage.

The book describes how to employ the methodology of quantitative psychology for effectively assessing risk in homeland security, defense actions, and critical infrastructure protection. Using pipelines, tunnels, underground rapid rail, and transit systems as examples, it maintains an emphasis on applying quantitative psychology to risk management in the areas of homeland security and defense.





Outlines the background and system operations of pipelines, tunnels, underground rail, and transit systems as well as other super-speed futuristic trains Covers materials used for fabricating weapons of mass destruction and operations for terrorism Deals with the probabilistic risk estimation process, event tree analysis, and fault tree analysis Discusses the risk and vulnerability assessment tools and methodologies used by experts and governmental agencies

Approved for public release by the U.S. Federal Government, this book presents regulations, standard processes, and risk assessment models recommended by the U.S. Department of Homeland Security and other federal and state agencies. Describing how to evaluate terrorism threats and warnings, it details protocols for preventive measures and emergency preparedness plans that are based on economic analysis.

With comprehensive coverage that includes risk estimation and risk acceptability analysis, the book provides a foundational understanding of risk and the various defensive systems that can improve safety and security as well as thwart terrorists efforts to sabotage critical infrastructure.
Preface xix
Acknowledgments xxi
Author xxiii
1 Introduction
1(4)
1.1 Background
1(1)
1.2 Risk Acceptability of Terrorism and Disaster
2(1)
1.3 Objective
2(1)
1.4 Scope
2(1)
1.5 Purpose
3(2)
2 Hazards, Terrorism, and Weapons of Mass Destruction on Pipelines, Tunnels, and Underground Rail and Transit Systems
5(84)
2.1 Introduction
5(1)
2.1.1 Terrorism and Disasters against Pipelines, Tunnels, Underground Rail, and Transit Systems
6(1)
2.2 Understanding the Basic Structure of Terror Organization
6(2)
2.2.1 Basic Recruitment Operations
6(1)
2.2.2 Terror Aspirant and Self-Radicalization
6(1)
2.2.3 Terror Member
7(1)
2.2.4 Terror-Suicide Bomber
7(1)
2.2.5 Technical Bomb and Improvised Explosive Devices Developer
7(1)
2.2.6 Terrorists Specializing in Chemical Threat
7(1)
2.2.7 Terrorists Specializing in Biological Threat
8(1)
2.2.8 Terrorists Specializing in Radiological and Nuclear Weapons
8(1)
2.2.9 Terrorist Intelligence Information and Reconnaissance Operation
8(1)
2.2.10 Terror Planner and Military Operation Planner
8(1)
2.3 Weapons of Mass Destruction
8(2)
2.4 Chemical Explosives
10(21)
2.4.1 Acetone Peroxide
11(1)
2.4.2 Ammonium Nitrate
12(1)
2.4.3 Ammonium Nitrate-Fuel Oil
13(1)
2.4.4 Cyclonite (RDX)
13(1)
2.4.5 Dingu and Sorguyl
14(1)
2.4.6 Hexamethylenetetramine Dinitrate
14(1)
2.4.7 Hexanitroazobenzene
14(1)
2.4.8 Hexanitrodiphenylamine
15(1)
2.4.9 Hexanitrohexaazalsowurtzitane
16(2)
2.4.10 Lead Azide
18(1)
2.4.11 Lead Styphnate
19(1)
2.4.12 Mercury(II) Fulminate
20(2)
2.4.13 Nitrocellulose
22(2)
2.4.14 Nitroglycerin
24(1)
2.4.15 Octagen(HMX)
24(1)
2.4.16 Pentaerythritol Tetranitrate
24(2)
2.4.17 Picric Acid
26(1)
2.4.18 Plastic Explosives
26(2)
2.4.19 2,4,6-Trinitrotoluene
28(3)
2.5 Mechanical Components and Applications of Chemical Explosives
31(9)
2.5.1 Alginates
32(1)
2.5.2 Aluminum Powder
32(1)
2.5.3 Base Charge
32(1)
2.5.4 Blasting Caps
32(1)
2.5.5 Blasting Galvanometer
32(1)
2.5.6 Blasting Machine
32(1)
2.5.7 Blast Meters and Boosters
33(1)
2.5.8 Bridgewire Detonator
33(1)
2.5.9 Brisance
33(1)
2.5.10 Deflagration
34(1)
2.5.11 Delay Time and Element
34(1)
2.5.12 Detonation
34(1)
2.5.12.1 Shock Wave
34(2)
2.5.12.2 Detonation Wave Theory
36(1)
2.5.12.3 Selective Detonation
37(1)
2.5.12.4 Sympathetic Detonation
37(1)
2.5.12.5 Detonation Development Distance
38(1)
2.5.13 Electroexplosive Device
38(1)
2.5.14 Oxidizer and Oxygen Balance of Explosives
38(1)
2.5.15 Heat of Explosion
38(1)
2.5.16 Underwater Detonation
38(1)
2.5.16.1 Shock Wave of Underwater Detonation
39(1)
2.5.16.2 Gas Bubble
39(1)
2.5.17 Calculation of Explosives
40(1)
2.5.18 Hazards of Explosives
40(1)
2.6 Chemical Threats as Poisonous Weapons and Lethal Dose (LD50)
40(11)
2.6.1 Chemicals' LD50
45(1)
2.6.2 Cyanide
46(1)
2.6.2.1 Cyanide LD50
46(1)
2.6.3 Mustard Agents
46(1)
2.6.4 Nerve Agents
47(1)
2.6.5 Toxic Industrial Agents
47(1)
2.6.6 Arsenic
47(1)
2.6.6.1 Arsenic LD50
48(1)
2.6.7 Inorganic Contaminants
48(3)
2.6.8 Organic Contaminants
51(1)
2.7 Biological Weapons
51(1)
2.8 Radiological and Nuclear Threats
51(9)
2.8.1 Radiological Dispersion Device
53(1)
2.8.2 Improvised Nuclear Device
53(1)
2.8.3 Nuclear Reactor Accident
53(1)
2.8.4 Nuclear Weapon
53(7)
2.9 Natural Disaster and Hazard
60(20)
2.9.1 Earthquakes
64(2)
2.9.2 Extreme Heat
66(5)
2.9.3 Floods
71(4)
2.9.4 Hurricanes
75(1)
2.9.5 Landslides and Mudslides
75(1)
2.9.6 Tornadoes
76(1)
2.9.7 Tsunamis
76(1)
2.9.8 Volcanoes
76(1)
2.9.9 Wildfires
77(1)
2.9.10 Winter Weather
78(1)
2.9.11 Lightning
78(1)
2.9.12 Avalanches
78(1)
2.9.13 Ultraviolet
79(1)
2.9.14 Space Weather
79(1)
2.10 Cyberterrorism
80(1)
2.11 Implications
81(8)
References
81(8)
3 Introduction to Pipelines, Tunnels, Underground Rail and Transit Operations, Terrorism, and Disasters
89(42)
3.1 Introduction
89(1)
3.2 Disaster and Acts of Terrorism against Pipelines, Tunnels, and Underground Rail and Transit Systems
90(15)
3.2.1 Security for Hazardous and Radioactive Material Transport Systems
91(2)
3.2.2 Fire, Explosion, and Detonation
93(2)
3.2.2.1 Vapor Cloud Explosion and Jet Flames
95(1)
3.2.2.2 Flash Point
95(1)
3.2.2.3 Flammability Range
95(1)
3.2.2.4 Auto ignition Temperature
95(1)
3.2.2.5 Flame Speed and Burning Velocity
96(1)
3.2.2.6 Pool Fires
96(2)
3.2.3 Emission and Dispersion
98(2)
3.2.3.1 Dispersion Situation: Buoyancy Effects
100(1)
3.2.3.2 Dispersion Situation: Momentum Effects
101(1)
3.2.3.3 Dispersion Situation: Source Terms
101(1)
3.2.3.4 Dispersion Situation: Source Elevation
101(1)
3.2.3.5 Dispersion Situation: Meteorology and Topography
101(1)
3.2.3.6 Dispersion Situation: Building and Obstructions
101(1)
3.2.4 High Toxic Release
101(1)
3.2.5 Dust and Fragment Explosion
102(1)
3.2.5.1 Explosion Process
102(1)
3.2.6 Freight Capsule or Vessel Burst Pressure and Energy Distribution
103(1)
3.2.7 Explosion Destruction by Missiles
103(1)
3.2.7.1 Sources, Types, and Propagation of Missiles
103(1)
3.2.7.2 Number and Size of Missiles
103(1)
3.2.7.3 Velocity of Missiles
103(1)
3.2.7.4 Angle of Departure of Missiles
104(1)
3.2.7.5 Shape, Air Resistance, and Flight of Missiles
104(1)
3.2.7.6 Flying Glass
104(1)
3.2.7.7 Falling Masonry and Glass
105(1)
3.3 Underground Freight Transportation through Pipelines, Tubular Rail, and Magnetic Levitation
105(5)
3.3.1 Automated Transportation System
105(1)
3.3.2 Automated Transportation Logistic System
105(1)
3.3.3 Underground Transportation Logistic System
106(1)
3.3.4 Pneumatic Capsule Pipeline for Underground Freight
106(1)
3.3.5 CargoCap
106(1)
3.3.6 Underground Container and Capsule Transport Systems
107(2)
3.3.7 Tubular Rail
109(1)
3.3.8 Magnetic Levitation Transportation System
109(1)
3.4 Railroad and Railway Systems
110(2)
3.5 Oil, Gas, and Other Hazardous Liquid Pipelines
112(2)
3.5.1 Unregulated Hazardous Material Liquid Pipelines
113(1)
3.6 Underwater/Immersed Tunnel and Cross-River Tunnel
114(2)
3.7 Transportation Tunnels
116(2)
3.7.1 Road Tunnels
116(1)
3.7.2 Transit and Rail Tunnels
117(1)
3.8 Mine Tunnels
118(1)
3.9 Drainage Tunnels
119(1)
3.10 Aqueducts
119(1)
3.11 Defense and Warfare Tunnels
119(2)
3.12 Illegal Underground Tunnels
121(1)
3.13 Implication
122(9)
References
122(9)
4 Risk and Vulnerability Assessment
131(50)
4.1 Introduction
131(1)
4.2 National Aeronautics and Space Administration Risk Analysis and Management
131(3)
4.2.1 Risk Matrices
132(1)
4.2.2 FMECAs, FMEAs, and Fault Trees
133(1)
4.2.3 NASA Probabilistic Risk Assessment
133(1)
4.3 Standard Homeland Security Risk Assessment and RAMCAP Plus Processes
134(16)
4.3.1 Fatalities and Serious Injuries
137(1)
4.3.2 Financial and Economic Impacts
137(10)
4.3.3 Vulnerability Analysis
147(1)
4.3.4 Threat Assessment
147(2)
4.3.5 Risk and Resilience Assessment
149(1)
4.3.6 Risk and Resilience Management
150(1)
4.4 Department of Defense Risk Assessment and Management
150(7)
4.4.1 Risk Reporting Matrix
151(3)
4.4.2 Security Risk Categories
154(3)
4.5 CARVER Matrix
157(5)
4.5.1 Criticality
158(1)
4.5.2 Accessibility
158(1)
4.5.3 Recuperability
159(1)
4.5.4 Vulnerability
160(1)
4.5.5 Effect
161(1)
4.5.6 Recognizability
161(1)
4.6 CARVER + Shock
162(1)
4.7 Model-Based Vulnerability Analysis
162(3)
4.8 Freight Assessment System
165(1)
4.9 Federal Emergency Management Agency HAZUS-MH
166(1)
4.10 Security Vulnerability Assessment
167(2)
4.11 Automated Targeting System
169(3)
4.11.1 ATS-Inbound
171(1)
4.11.2 ATS-Outbound
172(1)
4.11.3 ATS-Passenger
172(1)
4.11.4 ATS-Land
172(1)
4.11.5 ATS-International
172(1)
4.11.6 ATS-Trend Analysis and Analytical Selectivity
172(1)
4.12 Sandia National Laboratories Security Risk Assessment Methods
172(1)
4.13 ASME RA-S Probabilistic Risk Assessment
173(1)
4.14 Development of Prospect Theory
174(1)
4.14.1 Expected Utility Theory
175(1)
4.14.2 Prospect Theory
175(1)
4.15 Cumulative Prospect Theory
175(3)
4.15.1 Framing Effects
175(1)
4.15.2 Nonlinear Preferences
175(1)
4.15.3 Source Dependence
176(1)
4.15.4 Risk Seeking
176(1)
4.15.5 Loss Aversion
176(1)
4.15.6 Cumulative Prospect Theory
176(2)
4.16 Conclusion
178(3)
References
178(3)
5 Quantitative Risk Estimation Model for Pipelines, Tunnels, Underground Rapid Rail, and Transit Systems
181(34)
5.1 Introduction
181(1)
5.2 Elements of Risk Assessment
182(2)
5.2.1 Risk Estimation Development for Terrorism against Pipelines, Rails, and Tunnels
182(1)
5.2.2 Risk Estimation Development for Clandestine Fabrication and Transshipment of Weapons of Mass Destruction by Terrorists and Rebellious States to Endangering Homeland Security
183(1)
5.3 Event Tree Analysis
184(6)
5.4 Estimation of Risk and Risk Factors
190(7)
5.4.1 Calculation of Risk Rate
191(4)
5.4.2 Life Expectancy Models
195(2)
5.5 Fault Tree Analysis
197(3)
5.5.1 Example of Event Tree Analysis
197(3)
5.6 Identification of Hazards
200(1)
5.7 Terrorism Intrusion
201(1)
5.8 Flash Fire Probability
201(1)
5.9 Flash Fire: Ignition of Flammable Materials
201(3)
5.10 Detonation of Explosive Devices
204(6)
5.11 Large-Scale WMD Detonation
210(1)
5.12 Pipelines, Tunnels, Underground Rail, and Transit Systems Adjacent to Human Population
210(1)
5.13 Guideway Short Circuit
210(1)
5.14 Pipelines, Tunnels, Underground Rail, and Transit Systems Adjacent to Critical Assets
211(1)
5.15 Pipelines, Tunnels, Underground Rail, and Transit System Rupture
211(1)
5.16 Sensor Failure
211(1)
5.17 Mechanical and Electrical Failure
211(1)
5.18 Capsules, Underground Rail, and Transit System Derailment and Collision
211(1)
5.19 HAZMAT Freight Container and Pipeline Damage, Collapse, and Spill
212(1)
5.20 Risk Index Matrix
212(1)
5.21 Human Injury Risk
212(1)
5.22 Implication
213(2)
References
213(2)
6 Risk Acceptability Analysis Based on Quantitative Psychology of Intuitive Judgments
215(30)
6.1 Introduction
215(10)
6.1.1 Public Perception of Risk: Quantitative Psychology of Intuitive Judgment and Cumulative Prospect Theory
216(5)
6.1.1.1 Voluntary or Involuntary
221(1)
6.1.1.2 Discounting Time
222(1)
6.1.1.3 Identifiability of Taking a Statistical Risk
222(1)
6.1.1.4 Controllability
222(1)
6.1.1.5 Avoidability of Risks
223(1)
6.1.1.6 Position in Hierarchy of Consequence
223(1)
6.1.1.7 Ordinary or Catastrophic
223(1)
6.1.1.8 Natural or Man-Originated
224(1)
6.1.1.9 Magnitude of Probability of Occurrence
224(1)
6.2 Strategic Determination of Risk Acceptability
225(1)
6.3 Quantitative Revealed Societal Preference Method
225(11)
6.3.1 Behavior and Risk Attitude
228(1)
6.3.2 Establishing Risk Comparison Factors
228(1)
6.3.3 Controllability of Risks
228(1)
6.3.4 Perceived Degree of Control
229(1)
6.3.5 System Control in Risk Reduction
229(1)
6.3.5.1 Systemic Control of Risk
229(3)
6.3.5.2 Control Factors
232(1)
6.3.6 Controllability of New Technological Systems
232(1)
6.3.7 Cost-Benefit Analysis
232(2)
6.3.8 Prerequisites for Risk Acceptance of Terrorist Attacks and Disaster
234(1)
6.3.8.1 Requirement for a Methodology
234(2)
6.4 Establishing the Risk Referent
236(5)
6.4.1 Multiple Risk Referents
236(1)
6.4.2 Risk Proportionality Factor Derivation from Risk References
237(1)
6.4.3 Risk Proportionality Derating Factors
238(1)
6.4.4 Degree of Systemic Control
238(2)
6.4.5 Conversion of a Risk Reference to a Risk Referent
240(1)
6.5 Implication
241(4)
References
241(4)
7 Strategic Intelligence Analysis, Military Support, and Military Intuitive Judgment in Safeguarding Pipelines, Tunnels, Underground Rail and Transit Operations, and Homeland
245(86)
7.1 Introduction
245(1)
7.2 Intelligence Analysis
246(3)
7.3 Standard Intelligence Analysis Cycle
249(3)
7.4 Quantitative Risk Estimation for the Intelligence Analysis of Infrastructure Protection and WMD Mitigation
252(1)
7.5 Intelligence Analysis Development: Risk Estimation Models for Rail System Threat and Intuitive Predictions for the Smuggle of WMD Components and Clandestine Terror-Military Operations
252(4)
7.6 Intelligence Analysis: Event Tree Analysis Model
256(8)
7.7 Perspectives of Risk Acceptability in Strategic Intelligence Analysis
264(6)
7.7.1 Risk Estimation and Risk Acceptability
270(1)
7.8 Perspectives of Risk Acceptability Analysis for Pipelines, Tunnels, Underground Rail, and Transit Systems
270(18)
7.9 Military Intuitive Judgment and Decision-Making Process
288(22)
7.9.1 Command of the Armed Forces and the Chain of Command
306(3)
7.9.2 Understanding Military Operations
309(1)
7.10 Requirement of Military Support for Critical Infrastructure and Homeland Security
310(14)
7.10.1 Intelligence
311(1)
7.10.2 Northern Command
312(1)
7.10.3 Department of Defense: Chemical, Biological, Radiological, and Nuclear Incident Response
313(2)
7.10.3.1 US Army Chemical Material Agency
315(1)
7.10.3.2 US Army Research, Development, and Engineering Command
315(1)
7.10.3.3 US Army---20th Support Command Chemical, Biological, Radiological, Nuclear, and High-Yield Explosives Analytical Remediation Activity
315(1)
7.10.3.4 US Army---20th Support Command Chemical, Biological, Radiological, Nuclear, and Explosives
315(1)
7.10.3.5 Joint Program Executive Office for Chemical and Biological Defense
316(1)
7.10.3.6 National Guard Weapons of Mass Destruction: Civil Support Teams
316(1)
7.10.3.7 US Army Special Operations Command
317(1)
7.10.4 Posse Comitatus Act: USC Title 18, §1385
317(1)
7.10.5 Insurrection Act: USC Title 10, §331--335,
Chapter 15
318(1)
7.10.6 Military Support to Civilian Authorities: USC Title 10, §371--382,
Chapter 18
319(1)
7.10.7 Military Support: Maintenance of Other Troops: USC Title 32, §109,
Chapter 1
319(1)
7.10.8 National Guard for Homeland Defense Duty: USC Title 32, §904,
Chapter 9
320(1)
7.10.9 Response to Threats of Terrorist Use of Weapons of Mass Destruction: USC Title 50, §2311,
Chapter 40
321(1)
7.10.10 Presidential Policy Directive 8
321(2)
7.10.11 Manual for Civil Emergencies: DoD3025.1M
323(1)
7.10.12 Military Support to Civilian Authorities: DoDD 3025.1
323(1)
7.10.13 Military Assistance to Civilian Authorities: DoDD 3025.15
324(1)
7.11 Implication
324(7)
References
326(5)
8 Preparedness, Preventive, and Defensive Measures
331(48)
8.1 Introduction
331(1)
8.2 National Response Framework
332(5)
8.2.1 Local Governments
333(1)
8.2.1.1 Roles of Chief Elected or Appointed Officials
333(1)
8.2.1.2 Roles of Emergency Managers
333(1)
8.2.1.3 Roles of Department and Agency Heads
333(1)
8.2.1.4 Roles of Individuals and Households
333(1)
8.2.2 States, Territories, and Tribal Governments
334(1)
8.2.2.1 Roles of the Governor
334(1)
8.2.2.2 Roles of the State Homeland Security Adviser
334(1)
8.2.2.3 Roles of the Director of the State Emergency Management Agency
335(1)
8.2.2.4 Roles of Other State Departments and Agencies
335(1)
8.2.2.5 Roles of Indian Tribes
335(1)
8.2.2.6 Roles of Tribal Leaders
335(1)
8.2.3 Federal Government
335(1)
8.2.3.1 Role of the Secretary of Homeland Security
336(1)
8.2.3.2 Law Enforcement
336(1)
8.2.3.3 National Defense and Defense Support of Civil Authorities
336(1)
8.2.3.4 International Coordination
336(1)
8.2.3.5 Intelligence
336(1)
8.2.3.6 Private Sector and Nongovernmental Organizations
337(1)
8.2.3.7 Roles of Private Sector
337(1)
8.2.3.8 Roles of Nongovernmental Organizations
337(1)
8.2.3.9 Roles of Volunteers and Donors
337(1)
8.3 Emergency Preparedness
337(2)
8.3.1 Planning
337(1)
8.3.2 Organization
338(1)
8.3.3 Equipment
338(1)
8.3.4 Training
338(1)
8.3.5 Exercises, Evaluation, and Improvement
338(1)
8.4 Response
339(1)
8.4.1 Baseline Priorities
339(1)
8.4.2 Local, Tribal, and State Actions
339(1)
8.4.3 Federal Actions
340(1)
8.4.4 Alerts
340(1)
8.4.5 Operations Center
340(1)
8.5 Activate and Deploy Resources
340(1)
8.6 Proactive Response to Catastrophic Incidents
341(1)
8.7 Recovery
341(1)
8.8 Preventive and Defensive Measures
341(11)
8.8.1 Oil and Gas Pipeline Protection
341(1)
8.8.2 Road, Highway, and Rail Tunnel Protection
342(1)
8.8.2.1 Fire and Emergency Response
342(1)
8.8.2.2 Preventive Systems for Road and Highway Tunnels
343(2)
8.8.2.3 Preventive Measures for Terrorism
345(2)
8.8.2.4 Minimum Standard Preventive Measures
347(2)
8.8.2.5 High Standard Preventive Measures
349(2)
8.8.3 System Protection Interoperability for Road, Highway, and Rail Tunnels
351(1)
8.8.3.1 Emergency Responders and Operating Procedures
351(1)
8.8.4 Engineering and Salient Features of Technological Systems
352(1)
8.9 Mine Tunnels Hazard Prevention
352(8)
8.9.1 Lighting in Mine Tunnels
352(1)
8.9.2 Emergency Supply Facilities
353(1)
8.9.3 Thermal Stress
353(1)
8.9.4 Access
353(1)
8.9.5 Weil-Being Monitoring
353(1)
8.9.6 Training
354(1)
8.9.7 Personal Safety Devices and Accessories
354(1)
8.9.8 Surface Area Boundary Planning and Design
354(1)
8.9.9 Hazard, Vulnerability, and Risk Management of Mine Tunnels
355(1)
8.9.10 Hazardous Substances
356(1)
8.9.11 Fire and Explosion
356(1)
8.9.12 Heating and Inundation
356(1)
8.9.13 Outburst and Rockburst
357(1)
8.9.14 Strata Control in Mine Tunnels
357(1)
8.9.15 Mine Tunnel Explosive Materials Handling
358(1)
8.9.16 Mine Tunnel Ventilation
358(1)
8.9.17 Mine Tunnel Ventilation System Planning
359(1)
8.9.18 Airways, Air Crossings, and Stoppings
359(1)
8.9.19 Mine Tunnel Emergency Response: Fire Control and General Emergency Systems
359(1)
8.10 Approaches for the Detection of Illegal Tunnels by Other Experts
360(6)
8.10.1 Ground-Penetrating Radar
362(1)
8.10.2 Seismic Waves
362(1)
8.10.3 Electrical Resistivity
362(1)
8.10.4 Microgravity and Gravity Surveying
362(1)
8.10.5 Cosmic Rays
363(1)
8.10.6 Cross-Well Radar
363(1)
8.10.7 High-Resolution Seismic Methods
363(1)
8.10.8 Approach to the Tunnel Detection Agent-Based Model
364(1)
8.10.9 Electromagnetic Induction
365(1)
8.10.10 Tunnel Detection Using Forward Scatter between Borehole Signal Sources
365(1)
8.10.11 Fiber-Based Brillouin Optical Time Domain Reflectometry
365(1)
8.11 Approaches for the Detection of Land Mines and Improvised Explosive Devices by Other Experts
366(5)
8.11.1 Weapons Technological Intelligence
367(1)
8.11.2 Ultra-Wideband Microwave Technology
368(1)
8.11.3 Foot Patrols
368(1)
8.11.4 Lasers to Find Land Mines and IEDs
368(1)
8.11.5 Laser Drilling and Analyzing System
369(1)
8.11.6 Terahertz Quantum Cascade Lasers
369(1)
8.11.7 Dogs for IED Detectors
370(1)
8.11.8 Radio Signal
370(1)
8.11.9 Talon II Remote-Controlled Robot/Intelligent Robots
370(1)
8.11.10 Mine Clearing Line Charge
370(1)
8.12 Countering Nuclear and Radiological Threats
371(1)
8.13 Mother Nature and Intelligent-Improvised Explosive Devices to Defeat Low-Tech IEDs, Land Mines, Other Hidden Weapons, and the Enemy
371(1)
8.14 Conclusion
372(7)
References
373(6)
Index 379
Anna M. Doro-on