Security of Flood Defenses / Edition 1

Security of Flood Defenses / Edition 1

by Jos de Lange
ISBN-10:
3110620618
ISBN-13:
9783110620610
Pub. Date:
07/08/2019
Publisher:
De Gruyter
ISBN-10:
3110620618
ISBN-13:
9783110620610
Pub. Date:
07/08/2019
Publisher:
De Gruyter
Security of Flood Defenses / Edition 1

Security of Flood Defenses / Edition 1

by Jos de Lange

Hardcover

$175.99
Current price is , Original price is $175.99. You
$175.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

This book presents new approaches to security risk analysis and scenario building on the basis of water works such as flood barriers and storm surge barriers. Defending flood barriers is not only important because of climate change and rising sea levels, but also due to the vulnerability of fresh water supplies and the increasing number of people living in vulnerable low-lying river and sea deltas.


Product Details

ISBN-13: 9783110620610
Publisher: De Gruyter
Publication date: 07/08/2019
Series: Integrated Security Science , #2
Pages: 191
Product dimensions: 6.69(w) x 9.45(h) x 0.00(d)
Age Range: 18 Years

About the Author

Dr. Jos de Lange, TU Delft, The Netherlands.

Table of Contents

Preface v

1 Introduction 1

1.1 Vulnerability of water management and flood protection systems 1

1.2 What is this book about? 1

1.3 Flood security research project 2

1.4 Considerations 2

1.5 Scenario analysis 3

1.6 Scientific, military, and professional approaches 3

1.7 The Netherlands - location of many types of flood barriers 4

2 Summary 5

2.1 History of flood defenses and flood barriers 5

2.2 Vulnerabilities of flood defenses 6

2.3 Modem flood barrier constructions 7

2.4 Storm surge barriers 8

2.5 Flood defenses in defensive strategies 10

2.6 Flood defenses in offensive strategies 11

2.7 Vulnerabilities of flood defenses 12

2.8 Calculating security risks 14

2.9 Terrorism threat against flood surge barriers 16

2.10 Conclusions 18

2.11 Recommendations 20

3 History of flood defenses in the Low Countries 21

3.1 2,000 years ago 21

3.2 Historic flood defenses 22

3.3 Historic sluices 23

3.4 Development of pound locks 24

3.5 Levee breaches and floods, Middle Ages to 1900s 25

3.6 1916-1932, Zuyder Zee flood defenses 27

3.7 Levees, dams, and water locks, safety-related observations 28

3.7.1 Levee constructions are vulnerable 28

3.7.2 River entrances and sluices interrupt a flood defense 29

3.7.3 Flood defense vulnerability table 29

3.8 Levees, dams, and locks, security-related observations 31

3.8.1 Levee systems and security risks 32

3.8.2 Vulnerable spots in a system imply security risk 32

3.9 Conclusions 33

4 Delta Plan flood defense 34

4.1 1953 Flood Disaster 34

4.2 Delta Plan flood defenses 35

4.3 Three Islands Plan, Haringvliet dam 35

4.4 Delta Plan, safety-related observations 38

4.4.1 New flood barrier constructions relate to new safety risks 39

4.4.2 Moving parts imply increase of safety risks 39

4.4.3 Flood defense safety risk table (extended) 40

4.5 Delta Plan, security-related observations 40

4.5.1 Security assessment of levees and dams 40

4.5.2 Security assessment of flood barriers 42

4.5.3 Hollandse IJssel Storm Surge Barrier, security risks 43

4.5.4 Delta Plan safety and security risk matrix 44

4.6 Conclusions 44

5 Storm Surge Barriers 47

5.1 Eastern Scheldt Storm Surge Barrier 47

5.2 Maeslant Storm Surge Barrier 48

5.3 Hartel Storm Surge Barrier 49

5.4 Ramspol Bellows Weir Storm Surge Barrier (2002) 50

5.5 Storm surge barriers, safety-related observations 52

5.5.1 Eastern Scheldt and Haringvliet Storm Surge Barriers 52

5.5.2 Maeslant Storm Surge Barrier 52

5.5.3 Hartel Storm Surge Barrier 52

5.5.4 Ramspol Bellows Weir 53

5.6 Storm surge barriers, security-related observations 53

5.6.1 Eastern Scheldt Storm Surge Barrier 54

5.6.2 Maeslant Storm Surge Barrier 54

5.6.3 Hartel Storm Surge Barrier 55

5.6.4 Ramspol Bellows Weir 56

5.6.5 Delta Plan dam and flood barrier overview 58

5.7 Conclusions 59

6 Flood barriers in defensive strategies 61

6.1 Fifteenth century: brick walls and water for defense 61

6.2 Sixteenth century: Dutch earth and water fortresses 62

6.3 Flooding as a first line of defense 63

6.4 Dutch water defense lines 63

6.5 Amsterdam water defense line 64

6.6 Water defense lines, safety-related observations 66

6.7 Water defense lines, security-related observations 66

6.8 Conclusions 67

7 Flood defenses in offensive strategies 68

7.1 Flood defenses and violent actions 68

7.2 Physical attacks on dams (2001-2011) 69

7.3 Attacks on dams and levees in Europe 69

7.4 Dam Buster attacks in 1943 70

7.5 Attack modes and attack-types table 71

7.6 Offensive strategies, safety and security observations 72

7.7 Conclusions 73

8 Systematic analysis of flood barrier technologies 74

8.1 Flood defense categories 74

8.1.1 Types of primary flood defenses 75

8.1.2 Vulnerabilities of dams and levees 76

8.1.3 Sheet pile levee reinforcement 77

8.1.4 Concrete levees or flood walls 77

8.1.5 Security lessons 78

8.1.6 Dam and levee vulnerability table extended 78

8.1.7 Dams and levees attack-type table 79

8.1.8 Dams and levees: security implications 81

8.2 Hydraulic structures 82

8.2.1 Navigation locks 82

8.2.2 Vulnerabilities of lock constructions 83

8.2.3 Navigation lock attack-type table 84

8.2.4 Navigation locks: security implications 88

8.3 Flood barriers in secondary flood defenses 88

8.3.1 Guillotine-shaped flood barriers 89

8.3.2 Guillotine-shaped flood barriers, vulnerabilities 91

8.3.3 Guillotine-shaped flood barriers, attack-type table 93

8.4 Visor-shaped flood barriers 94

8.4.1 Neder-Rijn visor weirs (Driel, Hagestein, and Amerongen) 96

8.4.2 Thames Barrier 97

8.4.3 Visor-shaped flood barriers, vulnerabilities 99

8.4.4 Visor-shaped flood barriers, attack-type table 99

8.5 Flood barriers with sector gates 101

8.5.1 St. Petersburg sector gate flood barrier 101

8.5.2 Flood barriers with sector gates, vulnerabilities 102

8.5.3 Flood barriers with sector gates, attack-type table 103

8.6 Flood barriers and computer technology 104

8.6.1 Hacking of flood barrier systems 106

8.6.2 Barrier operating systems, vulnerabilities 106

8.7 Conclusions 106

9 Calculating security risks 108

9.1 Flood defense system approach 108

9.2 Risk and probability 109

9.3 Flood defenses and normal risks 110

9.4 Cascading risks, bowtie model 111

9.5 Swiss Cheese model 114

9.6 Exploring the bowtie input side 115

9.7 Determining relative vulnerabilities using numbers 118

9.8 Attack fault tree analysis 125

9.9 The "(man-portable) explosive device" attack scenario 126

9.10 Chemical plant protection scenario 128

9.11 Conclusions 130

10 Terrorism threat and flood defenses 133

10.1 A definition of terrorist attack 133

10.2 Terrorism in the Netherlands 134

10.3 Terrorism in Europe 137

10.4 Lessons learned from European attacks 138

10.5 A crystal bail gazing exercise; introduction to Game Theory 140

10.6 Game Theory and terrorist threat 141

10.7 Game Theory scenario approaches 144

10.8 Conclusions 147

11 Conclusions 150

11.1 Why this book? 150

11.2 Relation safety and security risks 151

11.3 Research into flood defenses 151

11.4 Historical research 152

11.5 Smarter design of flood defenses 152

11.6 New designs, new vulnerabilities 153

11.7 Feasible attack options 153

11.8 Flood defenses for security protection 153

11.9 Fundamentals of Flood Protection 154

11.10 Flood safety risks versus security risks 154

11.11 A matter of perception 155

11.12 Final observations 155

12 Recommendations 157

13 Epilogue 158

Appendix 160

List of Figures 168

List of Tables 170

Bibliography 172

Source account 178

Index 179

From the B&N Reads Blog

Customer Reviews