Security of Flood Defenses / Edition 1 available in Hardcover
- ISBN-10:
- 3110620618
- ISBN-13:
- 9783110620610
- Pub. Date:
- 07/08/2019
- Publisher:
- De Gruyter
- ISBN-10:
- 3110620618
- ISBN-13:
- 9783110620610
- Pub. Date:
- 07/08/2019
- Publisher:
- De Gruyter
Hardcover
Buy New
$175.99Overview
Product Details
ISBN-13: | 9783110620610 |
---|---|
Publisher: | De Gruyter |
Publication date: | 07/08/2019 |
Series: | Integrated Security Science , #2 |
Pages: | 191 |
Product dimensions: | 6.69(w) x 9.45(h) x 0.00(d) |
Age Range: | 18 Years |
About the Author
Table of Contents
Preface v
1 Introduction 1
1.1 Vulnerability of water management and flood protection systems 1
1.2 What is this book about? 1
1.3 Flood security research project 2
1.4 Considerations 2
1.5 Scenario analysis 3
1.6 Scientific, military, and professional approaches 3
1.7 The Netherlands - location of many types of flood barriers 4
2 Summary 5
2.1 History of flood defenses and flood barriers 5
2.2 Vulnerabilities of flood defenses 6
2.3 Modem flood barrier constructions 7
2.4 Storm surge barriers 8
2.5 Flood defenses in defensive strategies 10
2.6 Flood defenses in offensive strategies 11
2.7 Vulnerabilities of flood defenses 12
2.8 Calculating security risks 14
2.9 Terrorism threat against flood surge barriers 16
2.10 Conclusions 18
2.11 Recommendations 20
3 History of flood defenses in the Low Countries 21
3.1 2,000 years ago 21
3.2 Historic flood defenses 22
3.3 Historic sluices 23
3.4 Development of pound locks 24
3.5 Levee breaches and floods, Middle Ages to 1900s 25
3.6 1916-1932, Zuyder Zee flood defenses 27
3.7 Levees, dams, and water locks, safety-related observations 28
3.7.1 Levee constructions are vulnerable 28
3.7.2 River entrances and sluices interrupt a flood defense 29
3.7.3 Flood defense vulnerability table 29
3.8 Levees, dams, and locks, security-related observations 31
3.8.1 Levee systems and security risks 32
3.8.2 Vulnerable spots in a system imply security risk 32
3.9 Conclusions 33
4 Delta Plan flood defense 34
4.1 1953 Flood Disaster 34
4.2 Delta Plan flood defenses 35
4.3 Three Islands Plan, Haringvliet dam 35
4.4 Delta Plan, safety-related observations 38
4.4.1 New flood barrier constructions relate to new safety risks 39
4.4.2 Moving parts imply increase of safety risks 39
4.4.3 Flood defense safety risk table (extended) 40
4.5 Delta Plan, security-related observations 40
4.5.1 Security assessment of levees and dams 40
4.5.2 Security assessment of flood barriers 42
4.5.3 Hollandse IJssel Storm Surge Barrier, security risks 43
4.5.4 Delta Plan safety and security risk matrix 44
4.6 Conclusions 44
5 Storm Surge Barriers 47
5.1 Eastern Scheldt Storm Surge Barrier 47
5.2 Maeslant Storm Surge Barrier 48
5.3 Hartel Storm Surge Barrier 49
5.4 Ramspol Bellows Weir Storm Surge Barrier (2002) 50
5.5 Storm surge barriers, safety-related observations 52
5.5.1 Eastern Scheldt and Haringvliet Storm Surge Barriers 52
5.5.2 Maeslant Storm Surge Barrier 52
5.5.3 Hartel Storm Surge Barrier 52
5.5.4 Ramspol Bellows Weir 53
5.6 Storm surge barriers, security-related observations 53
5.6.1 Eastern Scheldt Storm Surge Barrier 54
5.6.2 Maeslant Storm Surge Barrier 54
5.6.3 Hartel Storm Surge Barrier 55
5.6.4 Ramspol Bellows Weir 56
5.6.5 Delta Plan dam and flood barrier overview 58
5.7 Conclusions 59
6 Flood barriers in defensive strategies 61
6.1 Fifteenth century: brick walls and water for defense 61
6.2 Sixteenth century: Dutch earth and water fortresses 62
6.3 Flooding as a first line of defense 63
6.4 Dutch water defense lines 63
6.5 Amsterdam water defense line 64
6.6 Water defense lines, safety-related observations 66
6.7 Water defense lines, security-related observations 66
6.8 Conclusions 67
7 Flood defenses in offensive strategies 68
7.1 Flood defenses and violent actions 68
7.2 Physical attacks on dams (2001-2011) 69
7.3 Attacks on dams and levees in Europe 69
7.4 Dam Buster attacks in 1943 70
7.5 Attack modes and attack-types table 71
7.6 Offensive strategies, safety and security observations 72
7.7 Conclusions 73
8 Systematic analysis of flood barrier technologies 74
8.1 Flood defense categories 74
8.1.1 Types of primary flood defenses 75
8.1.2 Vulnerabilities of dams and levees 76
8.1.3 Sheet pile levee reinforcement 77
8.1.4 Concrete levees or flood walls 77
8.1.5 Security lessons 78
8.1.6 Dam and levee vulnerability table extended 78
8.1.7 Dams and levees attack-type table 79
8.1.8 Dams and levees: security implications 81
8.2 Hydraulic structures 82
8.2.1 Navigation locks 82
8.2.2 Vulnerabilities of lock constructions 83
8.2.3 Navigation lock attack-type table 84
8.2.4 Navigation locks: security implications 88
8.3 Flood barriers in secondary flood defenses 88
8.3.1 Guillotine-shaped flood barriers 89
8.3.2 Guillotine-shaped flood barriers, vulnerabilities 91
8.3.3 Guillotine-shaped flood barriers, attack-type table 93
8.4 Visor-shaped flood barriers 94
8.4.1 Neder-Rijn visor weirs (Driel, Hagestein, and Amerongen) 96
8.4.2 Thames Barrier 97
8.4.3 Visor-shaped flood barriers, vulnerabilities 99
8.4.4 Visor-shaped flood barriers, attack-type table 99
8.5 Flood barriers with sector gates 101
8.5.1 St. Petersburg sector gate flood barrier 101
8.5.2 Flood barriers with sector gates, vulnerabilities 102
8.5.3 Flood barriers with sector gates, attack-type table 103
8.6 Flood barriers and computer technology 104
8.6.1 Hacking of flood barrier systems 106
8.6.2 Barrier operating systems, vulnerabilities 106
8.7 Conclusions 106
9 Calculating security risks 108
9.1 Flood defense system approach 108
9.2 Risk and probability 109
9.3 Flood defenses and normal risks 110
9.4 Cascading risks, bowtie model 111
9.5 Swiss Cheese model 114
9.6 Exploring the bowtie input side 115
9.7 Determining relative vulnerabilities using numbers 118
9.8 Attack fault tree analysis 125
9.9 The "(man-portable) explosive device" attack scenario 126
9.10 Chemical plant protection scenario 128
9.11 Conclusions 130
10 Terrorism threat and flood defenses 133
10.1 A definition of terrorist attack 133
10.2 Terrorism in the Netherlands 134
10.3 Terrorism in Europe 137
10.4 Lessons learned from European attacks 138
10.5 A crystal bail gazing exercise; introduction to Game Theory 140
10.6 Game Theory and terrorist threat 141
10.7 Game Theory scenario approaches 144
10.8 Conclusions 147
11 Conclusions 150
11.1 Why this book? 150
11.2 Relation safety and security risks 151
11.3 Research into flood defenses 151
11.4 Historical research 152
11.5 Smarter design of flood defenses 152
11.6 New designs, new vulnerabilities 153
11.7 Feasible attack options 153
11.8 Flood defenses for security protection 153
11.9 Fundamentals of Flood Protection 154
11.10 Flood safety risks versus security risks 154
11.11 A matter of perception 155
11.12 Final observations 155
12 Recommendations 157
13 Epilogue 158
Appendix 160
List of Figures 168
List of Tables 170
Bibliography 172
Source account 178
Index 179