11.07.2015 Views

transport of dangerous goods and risk management - Kirilo Savić

transport of dangerous goods and risk management - Kirilo Savić

transport of dangerous goods and risk management - Kirilo Savić

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

TRANSPORT OF DANGEROUS GOODS AND RISK MANAGEMENT 246(Energy Information Administration, 2001). In 1998, the ELN bombed the OCENSA pipeline, spilling over 30,000barrels <strong>of</strong> oil <strong>and</strong> triggering a blaze which killed more than 70 people <strong>and</strong> injured at least 100 others when the firespread through nearby villages (World Press, 2004).Following the launch <strong>of</strong> the Gulf War Coalition air campaign in January 1991, Iraqi leader Saddam Hussein orderedthe detonation <strong>of</strong> an estimated 1250 oil wells. Nearly 600 oil wells were engulfed in flames, spewing out thickbillows <strong>of</strong> smoke that "turned midday into midnight in Kuwait" (Popkin, 1991:23). Famous attack on the petroleumsupply chain was the bombing <strong>of</strong> the French tanker Limburg in October 2002 <strong>of</strong>f the coast <strong>of</strong> Yemen (BBC News,2002).POSSIBLE MITIGATION AND PREVENTION STRATEGIESThe most reliable way for a nation to protect itself against the disruption caused by environmental terrorism is todiversify resource use wherever possible. Multiple sources <strong>of</strong> food, water, <strong>and</strong> energy mean each individual sourceis less attractive as a target. In addition, federal, state, <strong>and</strong> local governments can protect environmental resources insitu through more intensive <strong>and</strong> focused monitoring efforts, in conjunction with increased environmental datagathering, a sort <strong>of</strong> “early-warning” system to identify future environmental <strong>risk</strong>s. Among the best defenses againstterrorist threats are public confidence in <strong>management</strong> systems <strong>and</strong> security experts.Perhaps the most fundamental action that can be taken to protect water systems is to limit or deny physical access tovulnerable points. One <strong>of</strong> activities is to increased number <strong>of</strong> coast guard patrols in the area <strong>of</strong> water intakes alongwith increased the number <strong>of</strong> daily water samples.According to the Center for Defense Information, the recommendations for reducing the physical <strong>risk</strong> toinfrastructure are:1. facilities (treatment plants, reservoirs, dams, storage facilities, pumping plants, intake facilities <strong>and</strong> controlsystems) should be identified <strong>and</strong> inventoried;2. physical access to those most critical to operations, or most vulnerable to attack, should be controlled;3. access to water distribution maps <strong>and</strong> facility plans should be controlled when there is a clear security <strong>risk</strong>;4. surveillance cameras, motion detectors, <strong>and</strong> lighting should be installed in appropriate places;5. to prevent hacking, supervisory control <strong>and</strong> data acquisition systems (SCADA) for monitoring <strong>and</strong>controlling water should not be connected to the Internet; <strong>and</strong>6. on-site water treatment chemicals should be kept in secure facilities <strong>and</strong> they should be inventoried on aregular basis (Center for Defense Information, 2002)."Early warning" monitoring systems can help to identify contamination events early enough to permit an effectiveresponse. An EWS must be reliable: it should minimize the potential for significant numbers <strong>of</strong> both false negatives(missing a true event) <strong>and</strong> false positives (reporting a false event). It must be easy to install <strong>and</strong> operate, providecontinuous monitoring <strong>and</strong> result in rapid notification <strong>of</strong> an event. Continuous monitoring reduces the likelihoodthat contamination events will be missed. The development <strong>of</strong> st<strong>and</strong>ard monitoring systems would reduce cost,permit sharing among users <strong>and</strong> facilitate repair <strong>and</strong> replacement (Foran & Brosnan, 2000). New <strong>and</strong> developingtechnologies are being developed <strong>and</strong> among these technologies are DNA microchip arrays (Betts, 1999a),immunologic techniques (Betts, 1999b), microrobots (Hewish, 1998). Most <strong>of</strong> these technologies are not yetcommercially available, nor have they been tested in large drinking water systems.A key component to the success <strong>of</strong> any response will be the advance preparation <strong>of</strong> a process or plan that providesguidelines for all appropriate stakeholders, including users, emergency responders <strong>and</strong> law enforcement agencies,local media <strong>and</strong> community leaders. The prevention <strong>of</strong> environmental terrorism will require a new vigilance: a newunderst<strong>and</strong>ing <strong>of</strong> both the nature <strong>of</strong> the threat, <strong>and</strong> formulation <strong>of</strong> appropriate <strong>and</strong> effective responses (Chaletcki,2001:16).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!