• further assessment of threat likelihood, where possible
  • a more complete, balanced, and clearly defined analysis of possible means of attack
  • more attention to cyber attacks and other attacks on C3 systems, especially attacks other than the introduction of computer viruses
  • a close examination of chemical and biological vulnerabilities
  • careful distinction between chemical attacks and biological attacks and between attacks involving agents with different properties
  • an examination of strategic, systemic vulnerabilities

To improve its understanding of strategic vulnerabilities, DOT should undertake (1) a strategic assessment of the surface transportation system's redundancies and interdependencies, and (2) an analysis of lessons learned about impact and mitigation from past accidents and natural disasters.

When DOT conducts a complete and thorough evaluation of potential R&D topics, using this systematic five-step strategy, the following themes will emerge:

  • the value of taking a dual-use approach, in which security objectives are furthered at the same time as other transportation goals
  • the potential for more use of modeling to improve understanding of the scope of the security problem
  • the importance of DOT's role in developing and disseminating information about best practices that use existing technologies and processes, including low-technology alternatives
  • the need to consider security as part of a broader picture, not a wholly new and different problem, but one that is similar and closely connected to the transportation community's previous experience in responding to concerns about safety, natural disasters, and hazardous materials


The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement