WO2008060308A2 - Modèle de données pour des évaluations de risque - Google Patents

Modèle de données pour des évaluations de risque Download PDF

Info

Publication number
WO2008060308A2
WO2008060308A2 PCT/US2007/000544 US2007000544W WO2008060308A2 WO 2008060308 A2 WO2008060308 A2 WO 2008060308A2 US 2007000544 W US2007000544 W US 2007000544W WO 2008060308 A2 WO2008060308 A2 WO 2008060308A2
Authority
WO
WIPO (PCT)
Prior art keywords
risk
data
asset
user
linear
Prior art date
Application number
PCT/US2007/000544
Other languages
English (en)
Other versions
WO2008060308A3 (fr
Inventor
Charles H. Quandel
Douglas Wayne Morrison
Jeffrey L. Siegel
W. Robert Moore
Glen Arthur Herman
Robert J. Marros
Alex Kavanagh
Michael Dale Bieberitz
Jason Thomas Daihl
Original Assignee
Hntb Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hntb Holdings Ltd filed Critical Hntb Holdings Ltd
Publication of WO2008060308A2 publication Critical patent/WO2008060308A2/fr
Publication of WO2008060308A3 publication Critical patent/WO2008060308A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q50/40
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B29/00Maps; Plans; Charts; Diagrams, e.g. route diagram
    • G09B29/003Maps
    • G09B29/006Representation of non-cartographic information on maps, e.g. population distribution, wind direction, radiation levels, air and sea routes
    • G09B29/007Representation of non-cartographic information on maps, e.g. population distribution, wind direction, radiation levels, air and sea routes using computer methods

Definitions

  • Embodiments of the present invention relate to facilitating the evaluation of security risks and the risk assessment and management associated with linear corridors, such as transportation corridors and utility corridors, for example. More particularly, embodiments relate to methods and systems for providing detailed geographic, demographic, environmental, and other types of information for evaluating and assessing risks associated with linear corridors and facilitating the development of mitigation strategies and event response for those risks.
  • linear corridors present an area that may be exposed to a significant threat of terrorist activities.
  • Such linear corridors may include transportation corridors, such as rail, roadway, and waterway corridors, as well as utility corridors, such as electric and gas corridors, for example.
  • transportation corridors such as rail, roadway, and waterway corridors
  • utility corridors such as electric and gas corridors, for example.
  • the nature of such linear corridors contributes to the risk of devastating terrorist activities.
  • the open infrastructure and accessibility of many linear corridors provide significant opportunities for attack.
  • linear corridors often intersect with densely populated and urbanized areas, potentially increasing the devastation of any such terrorist attack.
  • the movement of hazardous material along freight rail corridors or roadway corridors through dense urban environments presents a potential target for terrorist activities. Billions of tons of hazardous materials are shipped annually by various modes of transportation.
  • TIH toxic inhalation hazard
  • a terrorist attack of freight cars carrying TIH chemicals through a densely populated area would endanger many lives. Accordingly, there is a need for efficient systems and methods for evaluating and assessing security risks of linear corridors by providing detailed geographic, demographic, environmental, and other types of information. Additionally, it would be beneficial if such systems and methods further facilitated the development of mitigation and response strategies for identified security risks.
  • an embodiment of the present invention is directed to a method of assessing security risks.
  • the method includes selecting a site for evaluation.
  • the method also includes surveying the site and gathering information about the site, as well as an area around the site.
  • the method further includes combining the collected survey data with the information gathered about the site and the area around the site.
  • the method still further includes assessing the security risks of the site using the combined collected survey data and the information gathered about the site and the area around the site.
  • an embodiment of the present invention relates to a method of assessing security risks associated with a linear corridor.
  • the method includes selecting a linear corridor for evaluation.
  • the method also includes surveying the linear corridor and gathering context sensitive information associated with the linear corridor.
  • the method further includes combining the survey data and context sensitive information.
  • the method still further includes assessing security risks of the linear corridor using the combined survey data and context sensitive information.
  • an embodiment is directed to a method, implementable at least in part in a computing environment, for assessing security risks associated with a linear corridor.
  • the method includes accessing information associated with the linear corridor, wherein the information includes combined survey data and context sensitive information associated with the linear corridor.
  • the method also includes presenting the information associated with the linear corridor in a user interface, thereby allowing a user to view the linear corridor in the context of the information.
  • the method further includes assessing the security risks associated with the linear corridor using the combined survey data and context sensitive information.
  • an embodiment relates to one or more computer-readable media having computer-useable instructions embodied thereon for providing one or more user interfaces for facilitating the assessment of security risks for one or more linear corridors.
  • the one or more user interfaces include a navigation window and an attributes area.
  • the navigation window is configured to present geospatial data for an area associated with one or more linear corridors.
  • the navigation window is configured to allow a user to navigate the area.
  • the attributes area is configured to present information associated with the one or more linear corridors.
  • at least one of the navigation window and the attributes area are further configured to present risk assessment information associated with the one or more linear corridors.
  • an embodiment of the invention is directed to one or more computer-readable media having a data structure embodied thereon.
  • the data structure is provided for facilitating the assessment of security risks.
  • the data structure includes a spatial data model containing spatial data describing one or more linear corridors, which include one or more critical assets.
  • the spatial data model also includes data defining an asset class and one or more asset attributes for each of the critical assets.
  • the data structure also includes a risk factor data model containing data representing a plurality of risk factors, wherein at least a portion of the plurality of risk factors may be used to determine a baseline risk for at least one of the critical assets.
  • the data structure further includes a core risk data model containing core risk data for determining a core risk for the at least one of the critical assets, wherein the core risk is determined using the baseline risk for the at least one of the critical assets.
  • an embodiment is directed to a method for identifying safe havens for hazardous material transports.
  • the method includes gathering context sensitive information associated with at least one linear corridor.
  • the method also includes assessing security risks of the linear corridor using at least a portion of the context sensitive information.
  • the method further includes identifying one or more locations along the at least one linear corridor as one or more safe havens for hazardous material transports based at least in part on the assessed security risks of the linear corridor.
  • the present invention is directed to a method for providing a safe haven for a hazardous material transport in response to an event.
  • the method includes providing a data store including data representative of one or more safe havens, the data including, for each safe haven, one or more characteristics of the safe haven including a location of the safe haven.
  • the method also includes determining a location of the hazardous material transport.
  • the method further includes selecting one of the safe havens based at least in part on the location of the hazardous material transport.
  • the method still further includes moving the hazardous material transport to the selected safe haven.
  • an embodiment is directed to a method for providing a safe haven for a hazardous material transport in response to an event.
  • the method includes determining a location of the hazardous material transport.
  • the method also includes accessing information associated with linear corridors, wherein the information includes context sensitive information associated with the linear corridors.
  • the method further includes assessing security risks associated with the linear corridors using at least a portion of the context sensitive information.
  • the method also includes identifying a location along the linear corridors as a safe haven for the hazardous material transport, wherein the location is identified as a safe haven based at least in part on the assessed security risks associated with the linear corridors and the location of the hazardous material transport.
  • the method still further includes moving the hazardous material transport to the identified safe haven.
  • the present invention is directed to a computerized system for facilitating moving hazardous material transports to safe havens in response to an event.
  • the system includes one or more data stores including data representative of one or more safe havens, the data including one or more characteristics of the safe havens including a location for each of the safe havens.
  • the system also includes a hazardous material transport location component for determining the location of at least one hazardous material transport.
  • the system further includes a safe haven selection component for selecting a safe haven for the hazardous material transport based at least in part on the location of the hazardous material transport and at least one characteristic of the one or more safe havens.
  • an embodiment is directed to one or more computer-readable media having a data structure embodied thereon, the data structure for facilitating the determination of a safe haven for a hazardous material transport.
  • the data structure includes a first data field containing data representative of an identification of a safe haven and a second data field containing data representative of at least one characteristic of the safe haven.
  • FIG. 1 is a flow diagram showing an exemplary method for assessing security risks associated with linear corridors in accordance with an embodiment of the present invention
  • FIG. 2 is a block diagram showing an exemplary system that may be employed for assessing security risks associated with linear corridors in accordance with an embodiment of the present invention
  • FIGS. 3A-3I are illustrative screen displays showing user interfaces for navigating linear corridors and assessing security risks associated with the linear corridors in accordance with an embodiment of the present invention
  • FIGS. 4A-4I are illustrative screen displays showing user interfaces for navigating linear corridors and assessing security risks associated with the linear corridors in accordance with another embodiment of the present invention
  • FIG. 5 is a block diagram showing an exemplary data structure for facilitating the assessment of security risks in accordance with an embodiment of the present invention
  • FIG. 6 is a diagram depicting hypothetical rail corridors through an area showing intersections between the rail corridors and rail corridor segments;
  • FIG. 7 is a flow diagram showing an exemplary method for assessing risk along a linear corridor route in accordance with an embodiment of the present invention.
  • FIG. 8 is a flow diagram showing an exemplary method for identifying safe havens and selecting safe havens for transports carrying hazardous materials in accordance with an embodiment of the present invention.
  • FIG. 9 is a flow diagram showing an exemplary method for identifying safe havens and selecting safe havens for transports carrying hazardous materials in accordance with another embodiment of the present invention.
  • Embodiments of the present invention relate to assessing security risks associated with linear corridors, such as transportation corridors and utility corridors, for example.
  • survey and context sensitive data may be collected for areas surrounding linear corridors.
  • the linear corridors may be identified within the various data, and critical assets may be identified along each linear corridor. Users may access the data (e.g., via a computerized risk assessment system) to asses security risks associated with the critical assets and linear corridors.
  • Embodiments provide detailed geographic, demographic, environmental and other types of information and dedicated tools to facilitate the analysis of security risks associated with linear corridors and the development of mitigation strategies.
  • embodiments of the present invention facilitate the distribution of information regarding mitigation and response strategies by providing for the communication of such information to emergency response personnel via emergency responder networks, for example.
  • a variety of benefits may be realized via embodiments of the present invention, including, but not limited to: consistent, organized, and accessible information for security risk evaluation and assessment; cost effective use of skilled resources; factual presentation of information; ability to view linear corridor assets and their adjacent communities; minimal disruption to corridor service; enhanced safety for personnel (by minimizing on-the-ground interaction with linear corridor operations); scaleable to meet multiple security planning purposes and locations; and ability to tie into emergency responder networks, such as the Operation Respond emergency responder network.
  • emergency responder networks such as the Operation Respond emergency responder network.
  • Some embodiments of the present invention may be implemented at least in part in a variety of computing system environments. For example, embodiments may be implemented in an application program running on one or more personal computers (PCs).
  • PCs personal computers
  • This computing system environment is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention.
  • Embodiments of the invention may also be implemented with numerous other general purpose or special purpose computing system environments or configurations.
  • Examples of other well-known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
  • Embodiments of the invention may be described in the general context of computer-executable instructions, such as program modules.
  • program modules include routines, programs, objects, components, segments, schemas, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • Embodiments of the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote computer storage media including memory storage devices.
  • Computers typically include a variety of computer-readable media.
  • Computer-readable media includes any media that can be accessed by a computer and includes both volatile and nonvolatile media, removable and non-removable media.
  • Computer-readable media may comprise computer storage media and communications media.
  • Computer storage media include both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD), holographic or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer.
  • Communications media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
  • modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communications media includes wired media such as a wired network or direct wired connection, and wireless media such as acoustic, RF, infrared, spread spectrum and other wireless media.
  • Communications media are commonly used to upload and download information in a network environment, such as the Internet. Combinations of any of the above should also be included within the scope of computer-readable media.
  • the computer may operate in a networked environment using logical connections to one or more remote computers, such as a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above.
  • the logical connections may include connections to a local area network (LAN), a wide area network (WAN) and/or other networks.
  • LAN local area network
  • WAN wide area network
  • Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
  • Computer storage mechanisms and associated media provide storage of computer-readable instructions, data structures, program modules and other data for the computer.
  • a user may enter commands and information into the computer through input devices such as a keyboard and pointing device, commonly referred to as a mouse, trackball or touch pad.
  • Other input devices may include a microphone, touchscreen, camera, joystick, game pad, scanner, or the like.
  • computers may also include other peripheral output devices such as speakers and printers, which may be connected through an output peripheral interface.
  • a site is selected for evaluation.
  • the site may comprise an area of any size.
  • the site may be a municipality, such as a city, which may include a number of linear corridors.
  • the site may comprise a single linear corridor or simply a portion of a single linear corridor. Any and all such variations are contemplated to be within the scope of the present invention.
  • survey data regarding the site is collected by surveying the site.
  • collection of survey data may also include obtaining video and still images of portions of the site.
  • Any of a variety of survey methods may be employed within the scope of the present invention.
  • non-intrusive and/or non-contact survey methods may be employed.
  • the collection of data in such a manner allows a significant amount of survey data to be collected in an accurate, safe, and rapid manner, while not disrupting operations of linear corridors.
  • three dimensional survey data may be collected from an aircraft using light detection and ranging (LiDAR) technology.
  • LiDAR light detection and ranging
  • an aircraft may be equipped with front- and downward-facing video and still cameras to obtain video and still images of portions of the site.
  • a variety of other non-intrusive technologies such as ground penetrating radar (GPR), Sonar, and remote sensing applications, may also be employed within the scope of the present invention.
  • GPR ground penetrating radar
  • Sonar Sonar
  • remote sensing applications may also be employed within the scope of the present invention.
  • Context sensitive information regarding the site is also collected, as shown at block 106.
  • the information collected may include demographic, transportation, environmental, and linear corridor information, as well as a variety of other types of context sensitive information.
  • Such information may be collected from any of a variety of different sources within the scope of the present invention.
  • such information may be collected from existing public and commercially available GIS data resources.
  • the information may include real-time data, such as current weather information, which may assist in assessing not only security risks but also identifying mitigation and response strategies for actual events.
  • real-time wind speed and direction information may be useful in determining the areas that may be impacted by a release of TIH chemicals.
  • linear corridors are identified within the survey data and the context sensitive information collected at blocks 104 and 106.
  • such linear corridors may include, for example, transportation corridors, such as roadway, rail, and waterway corridors. Additionally, such linear corridors may include utility corridors, such as water, electric, and gas corridors, for example.
  • Critical assets along each linear corridor are also identified, as shown at block 110.
  • an asset may be any element or feature of a linear corridor.
  • assets may include such elements as bridges, grade crossings, mainline turnouts, mainline diamonds, mainline signals, track segments, and yard sites.
  • Each corridor may include a wide variety of different assets. However, many of the assets may be irrelevant for risk assessment purposes.
  • assets associated with a linear corridor may include such features as buildings, curb lines, and fences that are common and alone would be little use to a terrorist in causing a large scale incident. Accordingly, the assets that are most likely to be used in terrorist activities and are most relevant for risk assessment purposes are identified as critical assets.
  • Survey and context sensitive data are next associated with each identified critical asset and attributes are defined for each critical asset, as shown at block 112.
  • the context for effective risk assessment and decision-making may be provided.
  • a wide variety of data and attributes may be associated with each critical asset.
  • Table 1 below presents exemplary data elements and asset attributes that may be associated with a variety of rail assets. It should be noted that the assets and associated data and attributes shown in Table 1 are provided for illustrative purposes only and should in no way be considered limiting. A variety of additional assets may be considered critical assets for rail corridors. In addition, a variety of additional data and attributes may be associated with each critical asset listed in Table 1.
  • security risks associated with the linear corridors within the site may be assessed, as shown at block 114.
  • a system (such as that described in further detail below) may be provided to allow users to access the detailed survey and context sensitive information and assess security risks associated with linear corridors.
  • the system may provide a number of user interfaces (such as those also described in further detail below) for accessing the data and assessing security risks.
  • the user interfaces may include context sensitive mapping allowing users to view linear corridors and critical assets in the context of the survey data and context sensitive information collected for the site.
  • security risks may be evaluated and assessed at a variety of different levels. For example, in some embodiments, security risks may be assessed for each critical asset. Additionally or alternatively, in some embodiments, security risks for a portion of a linear corridor or an entire linear corridor may be assessed. In some cases, this may comprise assessing risk at each point along the linear corridor. In other cases, this may entail aggregating security risks associated with the critical assets within the portion of the linear corridor under review. In further embodiments of the present invention, security risks may be accessed for a selected area having multiple linear corridors within the site.
  • the assessment of security risks associated with linear corridors may employ a subjective and/or objective approach within various embodiments of the present invention.
  • a user may access the detailed survey and context sensitive information, viewing linear corridors and critical assets in the context of such information. After reviewing the information, the user may make a subjective determination of security risks associated with linear corridors and critical assets.
  • a system may be provided allowing the user to enter and record such subjective determinations.
  • risk assessment metrics may be defined within the system to allow for the objective quantification of risk associated with linear corridors under review based on the detailed survey and context sensitive information.
  • the risk assessment metrics may consist of relative values assigned for different aspects and parameters associated with security risk. For instance, different values may be assigned based on the population density within a particular radius around a critical asset. As another example, values may be assigned based on the accessibility of a critical asset (e.g., whether the area is fenced, has security cameras, etc.). As a further example, values may be assigned based on aspects of a critical asset, such as the structural integrity of a bridge, for example. Accordingly, risk assessment metrics may be defined for a wide variety of parameters within the scope of the present invention, thereby allowing for an objective quantification of security risk associated with critical assets and linear corridors.
  • the assessment of security risks within block 114 may include various activities within the scope of the present invention and is not necessarily limited to merely risk assessment.
  • the activities may include development of mitigation strategies, planning and preparedness, response strategies, and recovery strategies.
  • the assessment of risks associated with linear corridors may facilitate the routing of hazardous materials to reduce the use of corridors identified as having the highest risk, thereby reducing the threat of a devastating terrorist attack.
  • FIG. 2 a block diagram is provided illustrating an exemplary risk assessment system 200 that may be employed for assessing security risks associated with linear corridors in accordance with an embodiment of the present invention.
  • the risk assessment system may be centrally located and accessible to multiple users using customized user interfaces and security logins. Accordingly, the risk assessment system may provide for the distribution of consistent data to multiple users while allowing for custom dedicated tools by user needs.
  • the risk assessment system 200 may generally comprise a datasource 202, a workbench 204, and an application platform 206. It should be understood that the risk assessment system 200 shown in FIG. 2 is provided for illustrative purposes only and is not intended to limit the scope of the present invention.
  • the datasource 202 is configured to store the various pieces of data used by the risk assessment system 200 and may comprise a number of data components.
  • the datasource 202 may include a security settings component 206, which includes user information, such as usernames and passwords that may be associated with user profiles.
  • the user profiles define each user's access to the system and the various data pieces.
  • the user profiles may define each user's ability to enter and modify data.
  • the datasource 202 may also include a risk database 210, which stores data associated with the determination of security risks for linear corridors.
  • the risk database 210 may store values used as inputs in the objective calculation of security risks associated with linear corridors.
  • risk values that are determined by an objective risk calculation may also be stored in the risk database 210.
  • the risk database 210 may further store subjective comments and other information entered by users.
  • the datasource 202 may also include an imagery component 212 for storing imagery data. Such data may include any digital imagery gathered for the area being evaluated. For example, the data may include base maps, aerial photos, videos, and still images that have been collected.
  • the datasource 202 may further include a context sensitive data component 214, which may store any type of context sensitive information that has been collected for the area being evaluated, such as demographic information, environmental information, corridor asset information, and the like.
  • the context sensitive data may include, for example, information gathered from GIS databases.
  • the datasource 202 may further include a live data component 216, which may be configured to store or provide access to real-time data 216, such as current weather conditions, for example.
  • the workbench 204 operates as the center of processing for the risk assessment system and may include a number of components, such as a security manager 218, a data manager 220, a risk calculator 222, and a tool wrapper 224.
  • the security manager 218 coordinates user access to the system based on user information stored in the security settings component 208 of the datasource 202. In addition, the security manager 218 allows administrators to define and modify those security settings.
  • the workbench also includes a data manager 220, which operates to push and pull data to and from the datasource 202.
  • the data manager 220 may communicate with other components of the workbench and application platform to coordinate access to appropriate data pieces stored by the datasource 202, as well as receiving data from these other components and communicating the data to the datasource 202 for storage.
  • the workbench may also include a risk calculator 222 for performing objective risk assessment calculations.
  • the data manager 220 and risk calculator 222 may communicate to access the appropriate data pieces for the calculation of risk values for linear corridors.
  • a tool wrapper component 224 may be provided to allow for the addition of third party modules that would be interfaced with the workbench 204, thereby providing additional risk assessment features.
  • Third party modules may handle data pieces differently than the risk assessment system 200. Accordingly, the tool wrapper component 224 may provide for the transformation of data between formats appropriate for the risk assessment system 200 and a third party module interfaced with the system.
  • the risk assessment system 200 further includes an application platform 206, which facilitates user interaction with the risk assessment system 200 via a variety of user interfaces.
  • the application platform 206 may include a security administrator component 226, which provides for user access to the system via a secure login process.
  • the security administrator 226 provides user interfaces allowing administrators to manage the security settings for various users.
  • the application platform 206 also includes a risk assessment tool 228, which provides for the primary user interaction with risk assessment information stored by the datasource 202.
  • the risk assessment tool 228 may provide various user interfaces allowing users to view various aspects of linear corridors under review, including geospatial data, context sensitive information, video imaging, and the like.
  • the application platform 206 may further include a scenario builder 230, which may allow users to generate hypothetical threat scenarios and determine risks associated with those scenarios.
  • a variety of additional tools not shown in FIG. 2 may be further provided via the application platform 206 within the scope of the present invention.
  • embodiments of the present invention provide user interfaces for navigating the detailed information associated with linear corridors and assessing security risks associated with each corridor.
  • FIGS. 3 A through FIG. 31 a series of screen displays are provided illustrating user interfaces for navigating linear corridors and assessing security risks associated with those corridors in accordance with an embodiment of the present invention. It will be understood and appreciated by those of ordinary skill in the art that the screen displays of FIGS. 3A through 31 are provided by way of example only and are not intended to limit the scope of the present invention in any way.
  • a user may access the system and view a general area of interest. For example, as shown in FIG. 3A, a user has accessed the system and is viewing a map of Chicago. Typically, accessing the system will comprise a secure login process, such as a user being required to provide a valid username and password.
  • the user interface includes a navigation window 302 for viewing and navigating the area under review.
  • the navigation window provides a variety of geospatial data for an area navigated to by a user.
  • the user interface further includes an attributes area 304, allowing a user to further access a variety of information associated with the area under review, as well as input data into the system.
  • search methods may be used for navigating linear corridors within the scope of the present invention.
  • search methods may include map driven searches, corridor and milepost searches, street address searches, and latitude/longitude coordinate searches.
  • a search may be map driven by a user interacting with the navigation window 302.
  • a tool bar 306 is located adjacent the navigation window 302 and provides a number of tools for navigating to particular portions of the area under review. For instance, a user may employ tools to zoom in and out of the area.
  • a user may graphically select a particular corridor.
  • the user interface also includes a search tool 308, allowing a user to enter search criteria for quickly navigating to a particular area of interest.
  • a variety of contextual information may be viewed in the navigation window 302.
  • a "Layers" tab is provided in the attributes area 304, allowing a user to control the contextual information that is presented in the navigation window 302.
  • a user may select the particular layers of contextual information that the user wishes to view.
  • layers of contextual information may be selectively turned on and off. Such information may include, for example, demographic information, transportation information, environmental information, and corridor asset information. By selectively viewing particular layers, a user may view appropriate contextual information in conjunction with linear corridors.
  • a user may be primarily interested in population density along a particular corridor and may select to view only that layer while removing other layers.
  • a user may be primarily interested in environmental considerations associated with a corridor and may view that layer while removing other layers.
  • system-defined and/or user-defined shortcuts may be provided to quickly activate appropriate data layers and map scales.
  • An aerial photograph button 310 is also provided within the layers tab 308. By selecting the aerial photograph button 310, an aerial photograph may be overlaid onto the navigation window 302, as shown in FIG. 3C. Accordingly, a user may view additional contextual information via the aerial photograph. As a user navigates through an area, the user may recognize and wish to evaluate critical assets associated with linear corridors. For example, a user may recognize the bridge 312 in the navigation window 302 of FIG. 3C as a critical asset and may select the bridge 312 for further evaluation. After selecting the bridge 312, detailed information regarding the critical asset may be viewed, as initially shown in FIG. 3D. Details of the critical asset are shown in the navigation window 302, allowing the user to consider such issues as drainage, accessibility, general topography, and other features. In addition, an "Asset" tab of the attributes area 304 provides overview information regarding the selected critical asset, including information such as bridge number, milepost location, structure type, and other related asset information.
  • the "Asset" tab further includes a number of buttons 314, 316, 318, and 320, allowing a user to access further information regarding the critical asset. For example, by selecting the assessment data button 316, the user may view additional data associated with the critical asset for the purposes of risk assessment. As shown in FIG. 3E, a data window 322 is presented providing assessment data.
  • the assessment data may include population data, such as a report of resident and employee populations within a quarter-mile, half-mile, and one-mile radius around the asset.
  • the assessment data may also include environmental data, such as water features within a quarter-mile, half-mile, and one-mile radius around the asset.
  • the assessment data may further include transportation data, such as the number and identity of road/rail crossings within a quarter-mile, half-mile, and one-mile radius around the asset.
  • a user may also wish to view video and still images associated with the critical asset to observe details of the asset for evaluation purposes. Accordingly, by selecting the video flyover button 318, a user may view video associated with the critical asset, as shown in the video window 324 in FIG. 3F. Additionally, the user may view different resolution still images in an image window 326, such as that shown in FIG. 3G.
  • the images may include both forward-looking and downward-looking still images.
  • a user may further examine an interactive view by selecting the interactive view button 320.
  • a user may access a three-dimensional visualization of the critical asset, which is provided in the navigation window 302.
  • the three-dimensional visualization allows the user to view features of the critical asset and surrounding area from different perspectives, further facilitating the risk assessment process.
  • a user may develop and record assessment information, mitigation strategies, and response strategies by selecting the assessment input button 314.
  • input areas 328, 330, and 332 are provided in the attributes area 304, thereby allowing a user to enter and save details of his/her assessment of the critical asset. Accordingly, the present embodiment illustrates a subjective approach to risk assessment.
  • the user may note potential risks related to the surrounding area, such as risks to nearby residential populations.
  • users can develop mitigation strategies, such as approaches to harden the critical asset or reduce the accessibility of the asset, making it less susceptible to a terrorist attack.
  • the detailed data, maps, and views of the critical asset provide necessary information upon which to define mitigation elements and strategies.
  • the current user or another user may have previously entered comments regarding the asset.
  • the user may be able to view and modify the previous entered comments via the input areas 328, 330, and 332.
  • selected assessment data may be linked to emergency response networks, such as Operation Respond, to allow for the effective communication of assessment data, mitigation strategies, and response strategies to first response personnel, freight/commuter train operators, freight truck operators, and the like.
  • the response planning process may employ the system to minimize danger to adjacent populations through rapid response. For example, simple train born location equipment employing a GPS receiver and radio frequency transmitter can identify the location and identity of a train that may have been the subject of an attack.
  • a response coordinator or dispatch office may then access detailed information provided via embodiments of the present invention, including detailed maps, photos, and pre- established contingency plans and response strategies to implement appropriate emergency measures.
  • FIG. 4A through FIG. 41 a series of screen displays are provided illustrating user interfaces for assessing security risks associated with linear corridors in accordance with another embodiment of the present invention. It will be understood and appreciated by those of ordinary skill in the art that the screen displays of FIGS. 4A through 41 are provided by way of example only and are not intended to limit the scope of the present invention in any way.
  • a user may access the system, as shown in FIG. 4A, via an initial user interface allowing the user to login and view general system information.
  • the user interface may include a system status area 402, in which the user may enter a username and password to login.
  • the system status area 402 may also include a variety of status information, such as user privileges, login time, session length, last login, and network status.
  • a system updates area 404 may also be provided, allowing a user to view information regarding system downloads, builds, and patches that may be available, as well as recent data updates.
  • a user project area 406 may be provided to present summary information regarding projects associated with the current user.
  • the user interface may include a process navigation bar 408, which may indicate the user's current position in the assessment process. For example, as shown in FIG. 4A, the user is currently on the "Start" tab. The user may employ the process navigation bar 408 to navigate through the security risk assessment process.
  • a navigation window 410 is provided in the user interface, allowing the user to view a particular area of interest. Geospatial data regarding an area being reviewed may be provided via the navigation window 410.
  • the user interface may also include an attributes area 414 for presenting information associated with linear corridors, critical assets, and the risk assessment process. For example, in FIG.
  • an asset summary may be provided in the attributes area 414.
  • the attributes area 414 may further allow users to enter and modify information as will be described in further detail below.
  • a number of tools provided in a tool bar 412 may allow a user to interactively navigate the geospatial data provided in the navigation window 410 (e.g., to zoom in and out of the data)
  • the present embodiments includes a corridor navigation tool 416, which provides a primary navigation mechanism.
  • the corridor navigation tool 416 allows a user to selectively control the image (i.e., the portion of the linear corridor and surrounding area) displayed in the navigation window 410. Referring now to FIG. 4C, further details of the corridor navigation tool 416 will be described.
  • the corridor navigation tool 416 includes a corridor indicator 418, which provides a linear representation of a selected corridor.
  • Critical assets located along a selected corridor may also be represented in the corridor navigation tool 416 using a variety of indicia, such as that shown for critical asset 420.
  • different indicia e.g., varying colors and shapes
  • information associated with each critical asset such as, for instance, the type of a critical asset or the risk identified for a critical asset.
  • information such as an asset identification number, for instance, may be presented (e.g., via a pop-up dialog window).
  • a user may interactively control the portion of a selected linear corridor (and surrounding area) presented in the navigation window 410 by employing a corridor window 422 provided in the corridor navigation tool 416.
  • a user may move the corridor window 422 along the corridor indicator 418 (e.g., by clicking on the corridor window 422 and sliding the corridor window 422 along the corridor indicator 418), thereby selecting the portion of the corridor to display in the navigation window 410.
  • a user may also control the extent of the corridor displayed in the navigation window 410 by changing the size of the corridor window 422 (e.g., by clicking on an end of the corridor window 422 and moving the end left or right to resize the window 422).
  • the corridor navigation tool 416 may further include a corridor navigation menu 424, which a user may employ to control various aspects of the corridor navigation tool 416. For example, a user may select the corridor to navigate. In addition, the user may select a particular asset within the selected corridor to which to navigate directly.
  • the corridor navigation menu 424 may also allow the user to filter the asset types shown in the corridor navigation tool 416 and manually enter a milepost range for the corridor window 422. A user may be able to further access and control asset status information, such as graphical settings for the critical assets shown in the corridor navigation tool 416.
  • corridor indicator 418 shown in FIG. 4C merely provides a centerline representation of a linear corridor
  • further embodiments may account for the fact that some linear corridors may be more complex, such as rail corridors having multiple tracks, turnouts, and the like.
  • Such further embodiments may include corridor indicators providing further detail (e.g., show multiple tracks).
  • an alternative corridor navigation tool 426 is illustrated in FIG. 4D. As shown in FIG. 4D, various tracks, turnouts, and the like for a single corridor are provided in the corridor navigation tool. Additional, the approximate location of assets within the corridor may be better represented.
  • the corridor navigation tool 426 further includes buttons 428 allow a user to zoom in and out. As a user navigates a linear corridor, the user may access various information associated with the corridor.
  • the user is currently on the "Criticality" tab in the process navigation bar 408 and is provided asset information via the attributes area 414.
  • the user is provided an indication of a currently selected critical asset.
  • a list of critical assets for the selected corridor is indicated, providing summary information, including asset id, type, and priority (i.e., an indication of risk associated with the asset).
  • the attributes area 414 further provides the ability for users to add new assets by providing information, such as type of asset and location, and selecting the "Add" button 430.
  • the user may further access detailed information associated with a current critical asset.
  • the user may enter and/or adjust values within the data and select an update button 432 to update the data in the system.
  • the user may also access video and still images associated with the current critical asset to view particular details of the asset.
  • FIG. 4G having reviewed images and data associated with a critical asset, a user may perform a threat assessment for the asset.
  • the assessment may allow the user to provide information as to the accessibility, criticality, desirability, and recognizability of the critical asset.
  • such information may be system-determined and presented to the user, who may manually override the system determination.
  • the user may select an update button 434 to update the data in the system.
  • the user may also perform a vulnerability assessment for the current critical asset, as shown in FIG. 4H.
  • the user may identify various issues associated with the asset and enter subjective comments regarding each issue.
  • the user may also identify issue types and categories (e.g., level of concern for each issue) via drop-down menus and may indicate any countermeasures currently in place. Such information may then be used in objective risk determinations.
  • results of an objective risk assessment for a linear corridor may be represented in a number of ways within various embodiments of the present invention.
  • a user interface is illustrated showing the user navigating to the "Risk" tab of the process navigation bar 408.
  • the user interface provides an asset risk summary 436 for a current asset.
  • the summary shown in FIG. 41 provides top-level summary of various categories associated with risk assessment for the current asset, include desirability, criticality, accessibility, recognizability, and intangible effects.
  • An objective risk assessment value that has been calculated is provided for each. In some cases, a user may decide to override a value, and input a different value.
  • each of the components shown in the asset risk summary may include indicia, such as color-coding, to provide a quick indication as to a relative level of risk.
  • the user interface includes a corridor risk chart 440, which provides a graphical representation of the relative level of risk determined along the selected linear corridor.
  • the user interface also provides an asset risk summary 442 providing more detailed information for a current asset.
  • the asset risk summary 442 provides an indication of an objective risk value that has been determined for the current asset.
  • the asset risk summary 442 provides a variety of risk factor information associated with the determination of the objective risk value, such as vulnerability, importance, population within a predetermined radius, and proximity to entities, such as a hospital and police station.
  • the attributes area 414 allows the user to filter the risk factors included in the asset risk summary 442.
  • the attributes area 414 may provide a log indicating when risk calculations were performed.
  • FIG. 4K A further user interface showing risk determined for assets along a linear corridor is shown in FIG. 4K.
  • the user interface includes a asset risk summary area 444, that provides a representation of the corridor under review. As such, a use may view details of the corridor (e.g., number of tracks) in conjunction with risk determined for various assets within a window. In addition, detailed risk information may be provided for a currently selected asset.
  • a user may navigate to the "Needs" tab of the process navigation bar 408. Having reviewed the various information and risk calculations that have been performed, the user may enter comments regarding a linear corridor, a specific critical asset, or set of critical assets. For example, the user may enter comments regarding mitigation strategies, response strategies, and recovery strategies. These comments may then be made to other users, for example, to implement improvements to harden a critical asset or access response and recovery strategies in the event of an attack.
  • the present system is supported by a comprehensive data model that provides detailed geospatial data, core risk analytic support, and risk factors and metrics tailored to specific corridors and asset classes.
  • the data model provides data required to automatically calculate a baseline risk, consistency with standard risk algorithms and methodologies (e.g., Special Needs Jurisdiction Toolkit (SNJTK) and Risk Analysis and Management for Critical Asset Protection (RAMCAP)), and a model that is extensible and can be easily updated by the user.
  • SNJTK Special Needs Jurisdiction Toolkit
  • RAMCAP Critical Asset Protection
  • FIG. 5 a block diagram is provided showing an exemplary data structure 500 for facilitating the assessment of security risks in accordance with an embodiment of the present invention.
  • the data structure comprises a spatial data model 502, a risk factor data model 504, and a core risk data model 506.
  • the spatial data model 502 contains spatial data that includes geographic data and attributes necessary to describe linear corridors.
  • the spatial data model 502 may comprise a database derived from a variety of sources, including, for example, aerial data acquisition (including, in some embodiments, LIDAR mapping), railroad sources, commercially and freely available GIS sources.
  • the spatial data model 502 may include geospatially referenced linear corridor feature data, high resolution photography and video of linear corridor data, linear corridor data and maps, and GIS data.
  • the compilation of linear corridor asset attribute information and surrounding feature information in the spatial data model 502 enables the evaluation of risk along linear corridors in a repeatable, cost effective, and objective manner.
  • the spatial data model 502 includes information identifying critical assets along linear corridors within the spatial data.
  • the data identifies each critical asset as within a particular asset class and defines asset attributes for each critical asset.
  • a rail/roadway crossing may be identified as a critical asset along a rail corridor.
  • the specific rail/roadway crossing may be identified as within a rail/roadway crossing asset class.
  • Asset attributes associated with the rail/roadway crossing may include, for example, the number of tracks, number of lanes, average daily traffic, annual tonnage, percentage of hazardous material cars, track speed, signals, grade crossing warning system, adjacent land use, and population.
  • a spatial data model was generated that includes data from the CREATE project, which provided an existing geospatially referenced railroad feature data source.
  • mapping and GIS data was developed for most of the heavily used freight railroad corridors within the Chicago Terminal District.
  • the process included low altitude, high resolution aerial data acquisition using video, digital photography, and laser technologies.
  • the raw products were processed to obtain mapping in common CAD formats and railroad feature information in GIS format.
  • a spatial data model was built upon the CREATE database, including railroad feature information in a readily useable format for risk assessment. For example, each grade crossing found within the mapped territory can be identified in a grade crossing list. Each grade crossing is tagged with a unique identification and its geospatial coordinates identified in the State Plane coordinate system. Further attributes can then be easily attached by a GIS analyst or otherwise.
  • the CREATE project also included high resolution photography and video, which minimized the need for railroad property access to perform risk assessment functions.
  • aerial data was acquired from a helicopter platform at altitudes ranging from 50 to 75 meters.
  • data density was provided with a 3-inch photographic pixel resolution.
  • the high-resolution still photos were combined into 10 megabyte orthophotos, which enable risk assessment personnel to inspect large site areas in great detail.
  • the video provides a high resolution fly-by perspective traveling slowly down the track at a bout 30 feet per second. The data allows for the examination of the railroad environment without having to set foot on the railroad property. This process enables the risk assessment personnel to cover large segments of the railroad quite rapidly in contrast to a physical inspection of the site.
  • the subject area may be view by multiple personnel in different locations or can be reviewed again and again without requiring a return trip.
  • the data was obtained with a high speed scanner at low altitude, which provides a data density of 20-60 laser hits per square meter. Coloration may be provided to the data based on elevation or intensity.
  • a user may view points from any perspective, allowing risk assessment personnel to inspect a site from any physical location. For example, risk assessment personnel may choose to view railroad assets from the perspective of a terrorist, examining line of sight or ground topography.
  • a spatial data model for railroad corridors may also correlate railroads' track charts, structure lists, and valuation maps with other geospatial data. Information associated with attributes for railroad assets often resides in railroad-owned databases and may not be directly available by visible inspection. Accordingly, relevant data from railroad-owned databases may be correlated with other data in a spatial data model.
  • GIS data sources that include land use, population, transportation, and other geospatially referenced features may also be integrated with a spatial data model.
  • Such data facilitates risk assessments that include considerations of the existence and location of adjacent land use, population, and transportation features and venues that attract large numbers of people, for example.
  • a spatial data model may include data provided by commercially and free available data sources.
  • the risk factor data model 504 contains data representing risk factors that facilitate the calculation of a baseline risk for critical assets along linear corridors.
  • the baseline risk represents the inherent risk associated with a critical asset.
  • the data within the risk factor data model 504 includes specific risk factors for specific asset classes. Additionally, the data includes risk factors for different asset attributes. Accordingly, a baseline risk for a critical asset may be determined based on its asset class and asset attributes.
  • the risk factors may be based on best practice risk data and expert judgments to provide standard criteria for evaluating risk. As such, the risk factors may be broadly applicable to any linear corridor.
  • the risk factors included in the risk factor data model 504 are determined by a panel of risk experts consisting of industry and Kir personnel for each specific type of linear corridor.
  • the panel may identify specific classes of assets for linear corridors and relevant asset attributes. Accordingly, in such an embodiment, the panel's determinations may be used to structure the data in the spatial data model 502 by providing indications of asset class and relevant asset attributes within the spatial data. Additionally, the panel may determine risk factors based on each specific class of asset and/or asset attributes. The panel determined risk factors may then be used to generated the risk factor data model 504.
  • the core risk data model 506 provides an underlying data structure to support core risk calculations. In particular, the data structure includes data for determining core risk for critical assets based on a baseline risk determined using data in the spatial data model 502 and risk factor data model 504.
  • the core risk data model 506 includes data to support an analytic risk engine, known as a Rick Influence Network (RIN), that calculates risk and the affect that risk mitigation strategies have on risk.
  • RIN Rick Influence Network
  • the RIN methodology is an analytic risk methodology that is built on the basic building blocks of terrorism risk management, and incorporates best practices from commercial, defense, intelligence, and homeland security disciplines.
  • the RIN methodology is designed to be implemented in software so that evidence and influencers to risk can be assembled from sources and risk calculated, explicitly accounting for the uncertainty in the data.
  • the RIN methodology is recognized by the Department of Homeland Security as a methodology that successfully implements the metrics of the SNJTK and RAMCAP. Like the RAMCAP philosophy, the RIN methodology features a best-practice core risk methodology and the extensibility to add sector-specific considerations.
  • the RIN analytics produce SNJTK metrics, are compliant with RAMCAP, and have been provide in operational environments throughout the country.
  • risk assessment of linear corridors in conjunction with detailed geographic, demographic, environmental, and other types of information further facilitate a variety of mitigation, event response, planning, preparedness, and recovery strategies.
  • the present invention facilitates comparative analysis of routes for the transportation of hazardous material. Such analysis may be beneficial, for instance, in determining where to focus linear corridor improvement efforts (e.g., linear corridors to be expanded, strengthened against attacks, etc.). Additionally, such comparative analysis may facilitate the identification of routes having the lowest risk for transporting hazardous materials, thereby dictating routing of hazardous material transports, such as rail cars, tractor trailers, and cargo ships, for example.
  • FIG. 6 provides an example that depicts hypothetical rail corridors within a particular area.
  • the rail corridors intersect throughout the area, such that there are a number of intersections, including intersections 11 through 111, and a number of linear corridor segments, including linear corridor segments S l through S 17.
  • one route between a starting point 602 and ending point 604 includes segments Sl, S6, SI l, and S 15.
  • Another route between the starting point 602 and ending point 604 includes segments Sl, S3, S4, S8, S16, and S17.
  • a number of other routes between the starting point 602 and ending point 604 are also available. Referring now to FIG.
  • a flow diagram is provided illustrating an exemplary method 700 for assessing risk for a linear corridor route in accordance with an embodiment of the present invention.
  • a comparative analysis of the routes may be provided.
  • an area is selected that includes a number of linear corridors.
  • a starting point and ending point are also selected, as shown at block 704. For instance, the area shown in FIG. 6 may be selected, as well as the starting point 602 and ending point 604.
  • Linear corridor segments are identified within the area, as shown at block 706.
  • a linear corridor segment includes a portion of a linear corridor between two intersections without any intermediate intersections (e.g., S2 through S 17 in FIG. 6).
  • a linear corridor segment includes a portion of a linear corridor between an intersection and either a starting point or an ending point without any intermediate intersections (e.g., Sl between starting point 602 and 12 in FIG. 6).
  • Linear corridor segments defining a route between a starting point and an ending point are selected, as shown at block 708.
  • a user may wish to select a particular route to assess and may manually identify the segments.
  • the segments may be automatically selected by the system.
  • the system may be employed to automatically identify the risk associated with all possible routes between the starting point and ending point and/or to identify the route that has the lowest level of risk. To do so, the system may automatically determine all possible routes and generate a risk for each of the routes.
  • the risk along the route between the starting point and the ending point is then determined.
  • the risk for each linear corridor segment within the route is determined and the total risk for the route is determined by combining the risk associated with the linear corridor segments.
  • the calculated risk value or assessment is then presented to a user, as shown at block 712.
  • the present invention facilitates event response by determining safe havens for transports carrying hazardous materials, such as rail cars, tractor trailers, and cargo ships, for example.
  • safe haven refers to a location that, due to characteristics of the surrounding area, has a reduced overall risk, is less susceptible to an event that would lead to a release of hazardous material (such as a terrorist attack, natural disaster, or accident, for example) and/or would have a reduced impact if an event that resulted in the release of a hazardous material occurred at the location.
  • safe havens may be determined for transports carrying hazardous materials. Each transport may then be moved to its determined safe haven, thereby reducing its susceptibility to an attack and/or any impact that would result from an attack that involves the transport.
  • hazardous material transports may be moved to safe havens, thereby safeguarding the transports.
  • FIG. 8 a flow diagram is provided illustrating an exemplary method 800 for identifying safe havens and determining appropriate safe havens for transports carrying hazardous materials in response to an event in accordance with an embodiment of the present invention.
  • the method 800 described with reference to FIG. 8 is directed to an embodiment in which safe havens are predetermined and stored by the system. When an event occurs, a predetermined safe haven may be selected for each hazardous material transport, and the transports are then moved to the selected safe havens.
  • information relevant for the identification of safe havens is accessed.
  • the information may include the detailed geographic, demographic, environmental, and other types of information aggregated by systems of the present invention. Additionally, the information may include objective risk assessment calculations performed by systems of the present invention.
  • safe havens are identified based on the accessed information. Safe havens may be identified using a variety of different information in various embodiments of the present invention. Generally, relevant information relates to a location's susceptibility to an event that would result in a release of hazardous material from a transport (e.g., susceptibility to terrorist activity) and/or the impact a release of a hazardous material from a transport would have at a particular location.
  • safe havens may be identified based on: objective risk levels calculated by the system; population density in the surrounding area; proximity of police stations; proximity of fire stations; proximity of military installations; proximity of public waterways that may be affected by hazardous material releases; proximity of other utilities and/or hazardous material storage that may exacerbate the impact of an attack; security; and information specific to the type of linear corridor (e.g., information relevant to a rail corridor may include the number of main tracks, number of side tracks, ownership, signals, type of track, capacity, etc.).
  • Information stored by the system for each safe haven may include an identification of the safe haven, the safe haven's location, and characteristics of the safe haven that are relevant for determining which transports may be routed to the safe haven in response to an event.
  • an event occurs that triggers routing of transports carrying hazardous materials to safe havens.
  • this may be an event that indicates a greater likelihood that transports carrying hazardous materials could be targeted and/or a greater likelihood of a terrorist attack generally that may be exacerbated by the presence of hazardous material transports.
  • the occurrence of a natural disaster or accident and/or the anticipation of a natural disaster e.g., a hurricane
  • a number of different events may serve as a trigger, such as, for example, some form of terrorist activity, an increased terrorist threat level, a natural disaster, an accident, an the anticipation of a natural disaster.
  • an appropriate safe haven is determined for each transport, as shown at block 810.
  • the determination of an appropriate safe haven for a transport may be based on a variety of factors in accordance with various embodiments of the present invention. Typically, the determination will include a consideration of the location of a hazardous material transport and the location of surrounding safe havens as it may be beneficial to limit the amount of time to get a transport to a safe haven. Accordingly, some embodiments of the present invention may include one or more tracking systems for identifying the location of hazardous material transports. For example, in some embodiments, hazardous material transports may be equipped with GPS devices for locating the transports. In other embodiments, hazardous material transports may be equipped with RFID and RF systems may be employed for tracking the location of the transports.
  • an appropriate safe haven for a particular hazardous material transport may include characteristics of the transport and characteristics and capabilities of safe havens to receive hazardous material transports. Relevant characteristics of a hazardous material transport may include the type of hazardous material(s), volume of hazardous material(s), and size of the transport (e.g., the number of rail cars). Relevant characteristics for a safe haven may include the ability to handle certain hazardous materials and its capacity to receive a certain size of transport(s). For example, some safe havens may be better suited to receive certain types of hazardous materials than other safe havens. Additionally, each safe haven will typically have a limit to its capacity. For example, a particular safe haven for a rail corridor may have a limit to the number of rail cars it can receive.
  • the system may be used to determine appropriate safe havens for each hazardous material transport by comparing characteristics of each hazardous material transport (e.g., location, hazardous material(s) type/volume, size, etc.) against safe haven characteristics (e.g., capability to handle certain hazardous materials, capacity, risk level associated with safe haven, etc.).
  • characteristics of each hazardous material transport e.g., location, hazardous material(s) type/volume, size, etc.
  • safe haven characteristics e.g., capability to handle certain hazardous materials, capacity, risk level associated with safe haven, etc.
  • risk associated with routes required to move a transport from its current location to a safe haven may be a factor in selecting a safe haven for a hazardous material transport.
  • the route to the further safe haven may include a dense population area while the route to the further safe haven may include little to no population.
  • the method 700 described above may be used, for example, in the comparative analysis of routes.
  • the system may be able to coordinate the selection of safe havens for all hazardous material transports within a particular area. This may help to ensure that multiple hazardous material transports are not all routed to the same safe haven, thereby overloading the safe haven.
  • a route may be determined for moving the transport to the safe haven, as shown at block 812.
  • the method 700 described above may be employed to perform a comparative analysis of the possible routes. Generally, the system selects the route having the lowest level of risk as determined by objective risk calculations.
  • each hazardous material is moved from its current location to its determined safe haven. Any routes determined for hazardous material transports at block 812 may be employed.
  • a location that has not been predetermined as a safe haven may be selected and designated as a safe haven for a hazardous material transport after an event occurs.
  • an embodiment may include a system in which safe havens are not predetermined, but where locations are dynamically designated as safe havens for hazardous material transports after an event occurs.
  • a system may include predetermined safe havens but may also be able to dynamically identify other locations that can be used as safe havens for hazardous material transports after an event occurs. For example, in some cases, there may be an event in which it is either impractical or impossible to route a particular transport to any predetermined safe haven. In such cases, the system may determine the safest location for the transport and designate that location as a safe haven. Referring to FIG. 9, a flow diagram is provided showing an exemplary method
  • an event occurs that requires a response that includes routing hazardous material transports to safe havens.
  • a variety of different events may trigger such a response, including, for example, terrorist activity and/or a heightened threat level, natural disasters, etc.
  • a location is dynamically determined and designated as a safe haven for a hazardous material transport, as shown at block 904.
  • a location that has not been predetermined as a safe haven is determined to be the safest place for the hazardous material transport and is designated as a safe haven for the hazardous material transport.
  • the information discussed above as being relevant to the identification of safe havens and the determination of appropriate safe havens for particular hazardous material transports is also relevant to the determination at block 904.
  • a location having a reduced level of risk is selected by comparing characteristics of the hazardous material transport with information associated along linear corridors in the vicinity of the hazardous material transport.
  • a route may be determined to move the hazardous material transport from its current location to the determined safe haven, as shown at block 806.
  • the hazardous material transport is moved to the safe haven using a determined route.
  • embodiments of the present invention provide methods, systems, and user interfaces facilitating the assessment of security risks associated with linear corridors. Additionally, embodiments of the present invention facilitate mitigation, event response, planning, preparedness, and recovery strategies. Some embodiments facilitate comparative analysis of routes for hazardous material transports. Further embodiments facilitate determination of safe havens for hazardous material transports in response to an event indicating a likelihood that hazardous material transports may be attacked or otherwise susceptible to an event that may result in a release of hazardous material (e.g., natural disasters, etc.).
  • the present invention has been described in relation to particular embodiments, which are intended in all respects to be illustrative rather than restrictive. Alternative embodiments will become apparent to those of ordinary skill in the art to which the present invention pertains without departing from its scope.
  • safe havens For example, the need for safe havens has been discussed above in one embodiment in connection with terrorist threats. However, the present invention could be used in other instances where hazardous material transports might need to be moved along a linear corridor to a safer location.
  • an impending natural disaster might be an event that triggers a safe haven response as described herein.
  • safe havens would be determined at least in part based on their ability to act as a better location for the hazardous material transport during the natural disaster.
  • Other events where movement of hazardous materials from a current location to a second location that would result in a reduced risk to individuals or infrastructure are contemplated by and within the scope of the present invention.

Abstract

L'invention concerne l'évaluation de risques associés à des corridors linéaires, tels des corridors de transport et des corridors d'utilités. Une structure de données est fournie pour faciliter les évaluations de risque. La structure de données comprend un modèle de données spatiales incluant des données spatiales décrivant des corridors linéaires et des actifs critiques, y compris des données spatiales définissant une catégorie d'actif et des attributs d'actif pour chaque actif critique. La structure de données comprend également un modèle de données de facteur de risque qui contient des données représentant des facteurs de risque utilisés pour déterminer un risque de base pour au moins un des actifs critiques. La structure de données comprend en outre un modèle de données de risque central contenant des données de risque central pour déterminer un risque central pour l'actif critique en utilisant le risque de base pour l'actif critique.
PCT/US2007/000544 2006-09-11 2007-01-09 Modèle de données pour des évaluations de risque WO2008060308A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US53089206A 2006-09-11 2006-09-11
US11/530,892 2006-09-11

Publications (2)

Publication Number Publication Date
WO2008060308A2 true WO2008060308A2 (fr) 2008-05-22
WO2008060308A3 WO2008060308A3 (fr) 2008-12-11

Family

ID=39402144

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/000544 WO2008060308A2 (fr) 2006-09-11 2007-01-09 Modèle de données pour des évaluations de risque

Country Status (1)

Country Link
WO (1) WO2008060308A2 (fr)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8779949B2 (en) 2012-09-28 2014-07-15 International Business Machines Corporation De-noising scheduled transportation data
US9076330B2 (en) 2012-09-28 2015-07-07 International Business Machines Corporation Estimation of arrival times at transit stops
US9304006B2 (en) 2012-08-31 2016-04-05 International Business Machines Corporation Journey computation with re-planning based on events in a transportation network
CN105652164A (zh) * 2016-01-08 2016-06-08 中国南方电网有限责任公司超高压输电公司检修试验中心 一种绝缘子污秽闪络事故风险等级评估方法
US9459108B2 (en) 2012-08-31 2016-10-04 International Business Machines Corporation Hedging risk in journey planning
US9607155B2 (en) 2010-10-29 2017-03-28 Hewlett Packard Enterprise Development Lp Method and system for analyzing an environment
CN110738412A (zh) * 2019-10-12 2020-01-31 合肥泽众城市智能科技有限公司 一种居民户内燃气爆炸风险评估方法及装置

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7308388B2 (en) * 1999-12-03 2007-12-11 Digital Sandbox, Inc. Method and apparatus for risk management

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7308388B2 (en) * 1999-12-03 2007-12-11 Digital Sandbox, Inc. Method and apparatus for risk management

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ANDERSON M.D.: 'Development of a GIS-Based Hazardous Materials Transporation Management System' UNIVERSITY OF ALABAMA AT BIRMINGHAM. TUSCALOOSA: UNIVERSITY TRANSPORTATION CENTER FOR ALABAMA 2000, page I-36 *
HUSDAL J.: 'The Reliability and Vulnerability of Transportation Lifelines' THE SUPPLY CHAIN RISK MANAGEMENT BIOG., MOLDE UNIVERSITY COLLEGE, MOLDE, NORWAY 25 April 2002, *
KIM S.: 'Development of Risk Assessment Decision Support System for Hazardous Materials Movement' DISS. VIRGINIA POLYTEVHNIC INSTITUTE AND STATE UNIV., [Online] September 1991, Retrieved from the Internet: <URL:http://www.proquest.umi.com> *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9607155B2 (en) 2010-10-29 2017-03-28 Hewlett Packard Enterprise Development Lp Method and system for analyzing an environment
US9304006B2 (en) 2012-08-31 2016-04-05 International Business Machines Corporation Journey computation with re-planning based on events in a transportation network
US9459108B2 (en) 2012-08-31 2016-10-04 International Business Machines Corporation Hedging risk in journey planning
US9829334B2 (en) 2012-08-31 2017-11-28 International Business Machines Corporation Hedging risk in journey planning
US8779949B2 (en) 2012-09-28 2014-07-15 International Business Machines Corporation De-noising scheduled transportation data
US9076330B2 (en) 2012-09-28 2015-07-07 International Business Machines Corporation Estimation of arrival times at transit stops
US9183741B2 (en) 2012-09-28 2015-11-10 International Business Machines Corporation Estimation of arrival times at transit stops
CN105652164A (zh) * 2016-01-08 2016-06-08 中国南方电网有限责任公司超高压输电公司检修试验中心 一种绝缘子污秽闪络事故风险等级评估方法
CN105652164B (zh) * 2016-01-08 2019-03-12 中国南方电网有限责任公司超高压输电公司检修试验中心 一种绝缘子污秽闪络事故风险等级分析方法
CN110738412A (zh) * 2019-10-12 2020-01-31 合肥泽众城市智能科技有限公司 一种居民户内燃气爆炸风险评估方法及装置
CN110738412B (zh) * 2019-10-12 2023-09-08 合肥泽众城市智能科技有限公司 一种居民户内燃气爆炸风险评估方法及装置

Also Published As

Publication number Publication date
WO2008060308A3 (fr) 2008-12-11

Similar Documents

Publication Publication Date Title
US8190466B2 (en) Methods and systems for identifying safe havens for hazardous transports
US8255262B2 (en) Methods and systems for assessing security risks
AU2019275041B2 (en) System and method for vegetation management risk assessment and resolution
AU2007286064B2 (en) Advanced emergency geographical information system
US7873524B2 (en) Method and apparatus for monitoring and responding to land use activities
US20080077474A1 (en) Method and system for global consolidated risk, threat and opportunity assessment
Petrova-Antonova et al. Methodological framework for digital transition and performance assessment of smart cities
WO2008060308A2 (fr) Modèle de données pour des évaluations de risque
Hatoum et al. The use of Drones in the construction industry: Applications and implementation
Webber-Youngman et al. The impact of forensic laser scanning technology on incident investigations in the mining industry
Abdalla Status of Spatial Analysis for Urban Emergency Management
Abdullah Geographic Information Systems for Aviation Incident Management: Application to Kuwait International Airport
Schaefer A Holistic Methodology for Large-Scale Evacuation Routing
Shrestha Data Validation and Quality Assessment of Voluntary Geographic Information Road Network of Castellon for Emergency Route Planning
Huang Services for crisis maps production at international level: presentation and case studies
Hubbard et al. Investigation of Strategic Deployment Opportunities for Unmanned Aerial Systems (UAS) at INDOT
Olusina et al. Journey to Crime Using Dijkstra's Algorithm
Johnson GIS technology and applications for the fire services
CN115752490A (zh) 基于大数据和定位技术的安全出行路径优化方法及系统
CN117734778A (zh) 一种铁路工作人员定位方法、装置及设备
Roper Information Systems for Infrastructure Management and Emergency Response
Roper Spatial Data Fusion for Infrastructure Condition Assessment
OCHIENG APPLICATION OF GIS FOR EFFECTIVE AND EFFICIENT FIRE DISASTER EMERGENCY RESPONSE AND MANAGEMENT. A Case
Akula et al. Context-Aware Computing Framework for Improved Bridge Inspection
Perdikaris GIS: a common operational picture for public safety and emergency management

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07866982

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07866982

Country of ref document: EP

Kind code of ref document: A2