Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter August 28, 2013

Analysis of Criminal and Terrorist Related Episodes in Railway Infrastructure Scenarios

  • Francesca De Cillis EMAIL logo , Maria Carla De Maggio , Concetta Pragliola and Roberto Setola

Abstract

Prevention and preparedness of risks in railway transportation systems is crucial for homeland security and require, among other things, a proper analysis of the vulnerabilities of the assets, a clear awareness of criticalities, possible countermeasures and adequate methods to design, scale and optimize the protection. To this end, in this paper we present an analysis of various security incidents and terrorist attacks that took place from 1972 to 2011; all involving railway infrastructures. All of the collected information has been stored in a database, aptly named RISTAD (Railway Infrastructure Systems Terrorist Attacks Database). Specifically, this research focuses on railway assets in order to identify those environmental, architectonic and infrastructural aspects that make such targets more “attractive” from a criminal point of view. We analyzed about 540 criminal-related episodes utilizing open source documents in an effort to correlate the acts with the peculiar characteristics of the asset. The last section is specifically focused on stations, attempting to emphasize both interesting and, for some aspects, non-intuitive correlation among collected data (e.g., lethality and number of attacks as a function of the number of tracks, the number of daily passengers, station extension, presence and type of security systems, etc.).


Corresponding author: Francesca De Cillis, Complex Systems and Security Lab, University Campus Bio-Medico of Rome, Via Alvaro del Portillo 21, 00128 Rome, Italy, e-mail:

  1. 1

    Actually, air transportation authorities are planning to relax some regulations (e.g., measures for the carriage of liquid in cabin, etc).

  2. 2

    More information available at http://transweb.sjsu.edu/.

  3. 3

    Readers interested in RISTAD can use the procedure illustrated on the website http://metrip.unicampus.it/.

  4. 4

    “Corriere della Sera” (Italy), Kommersant (Russia), CincoDìas.com (Spain) and other newspaper of the countries involved in railway attacks.

This work is partially supported by the European Commission, Directorate-General Home Affairs, within the Specific Programme on “Prevention, Preparedness and Consequence Management of Terrorism and other Security-related risks,” under Grant HOME/2010/CIPS/AG/035 MEthodological Tool for Railway Infrastructure Protection (METRIP).

References

Amtrak (2012) Amtrak National facts. [Online]. Available: http://www.amtrak.com/servlet/ContentServer?c=Page&pagename=am%2FLayout&cid=1246041980246 (accessed May 2013).Search in Google Scholar

Amtrak, P. D. (2012) Amtrak Security Program Recognized as Gold Standard by TSA. [Online]. Available: http://police.amtrak.com/index.php?option=com_content&view=article&id=84:amtrak-security-program-recognized-as-gold-standard-by-tsa&catid=1:latest-news&Itemid=50 (Accessed May 2013).Search in Google Scholar

Butterworth, B. R. (2011) Empirical Data to Guide Risk Mitigation: Examples from MTI Database. Mineta Transportation Institute National Transportation Security Center.Search in Google Scholar

Committee on Homeland security, Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity (2007) The London Bombing: Protecting Civilian Targets from Terrorist Attacks. Washington: U.S. Government Printing Office.Search in Google Scholar

E. Commission (2012) Passenger Transport Staistics. September 2012. [Online]. Available: http://epp.eurostat.ec.europa.eu/statistics_explained/index.php/Passenger_transport_statistics#Rail_passengers. (accessed May 2013).Search in Google Scholar

Jenkins, B. M. and B. R. Butterworth (2010) Explosives and Incendiaries Used in Terrorist Attacks on Public Surface Transportation: a Preliminary Empirical Analysis. Mineta Transportation Institute National Transportation Security Center.Search in Google Scholar

Jenkins, B. M. and J. Trella (2012) Carnage Interrupted: an Analysis of Fifteen Terrorist Plots Against Public Surface Transportation. Mineta Transportation Institute National Transportation Security Center.Search in Google Scholar

M. o. R. Governement of India (2011) Indian Railways – Year Book 2010/2011.Search in Google Scholar

Marrone, S., R. Nardone, A. Tedesco, P. D’Amore, V. Vittorini, R. Setola, F. De Cillis and N. Mazzocca (2013) “Vulnerability Analysis and Modeling for Critical Infrastructure Protection.” In Seventh Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection. Washington, DC, USA.10.1016/j.ijcip.2013.10.001Search in Google Scholar

Moore, M. S. (2011) Terrorist Attacks on Railroads. 11th May 2011. [Online]. Available: http://www.psmag.com/politics/terrorist-threat-of-wrecking-the-railroad-really-hard-31033/ (accessed March 2013).Search in Google Scholar

National Consortium for the Study of Terrorism and Responses to Terrorism (START). GTD Global Terrorism Database. [Online]. Available: http://www.start.umd.edu/gtd/search/IncidentSummary.aspx?gtdid=199805200001 [accessed September 2012].Search in Google Scholar

RAND Corporation. RAND Database of Worldwide Terrorism Incidents (RDWTI). [Online]. Available: http://smapp.rand.org/rwtid/search_form.php (accessed September 2012).Search in Google Scholar

President’s Commission on Critical Infrastructure Protection.(1997) “Critical Foudations – Protecting America’s Infrastructures.”Search in Google Scholar

Rete Ferroviaria Italiana, RFI (2007) Classificazione degli impianti Ferroviari aperti al pubblico.Comunicazione operativa n. 242/RFI del 27 luglio 2007. [Online]. Available: http://www.rfi.it/cms/v/index.jsp?vgnextoid=dd5698af418ea110VgnVCM1000003f16f90aRCRD. (accessed May 2013).Search in Google Scholar

Setola, R. and M. C. De Maggio (2012) “System Dynamics for Railway Infrastructure Protection.” In 7th International Conference on Critical Information Infrastructure Security (CRITIS12), Norway.Search in Google Scholar

“Terrorism Research,” [Online]. Available: http://www.terrorism-research.com/ (accessed 2012).Search in Google Scholar

Published Online: 2013-08-28
Published in Print: 2013-10-01

©2013 by Walter de Gruyter Berlin Boston

Downloaded on 26.4.2024 from https://www.degruyter.com/document/doi/10.1515/jhsem-2013-0003/html
Scroll to top button