passenger station and terminal design for safety

Transcription

passenger station and terminal design for safety
PASSENGER STATION AND TERMINAL DESIGN FOR
SAFETY, SECURITY AND RESILIENCE TO TERRORIST
ATTACK
Project nº:
FP7-SCPO-GA-2011-266202
Funding Scheme:
CP – Collaborative Project
Call (part) identifier:
FP7-SST-2010-RTD-1
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
Due date of deliverable:
30/11/2013
Start date of project:
01/06/2011
Organization name of lead for this deliverable:
Actual submission date:
29/11/2013
Duration:
36 months
ISDEFE
Revision:
1.0
Project co-funded by the European Commission within the Seventh Framework Programme (2007-2013)
Dissemination Level
PU
Public
PP
Restricted to other programme participants (including the Commission Services)
RE
Restricted to a group specified by the consortium (including the Commission Services)
CO Confidential, only for members of the consortium (including the Commission Services)
X
Date:
29/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Document Change Log
Revision
Edition Date
Author
Modified Sections
/ Pages
Comments
0.1
10/09/2012
Valeria Salaris
1,2,3
Initial draft
0.2
15/11/2012
Carlos Oliver
3
Methodology
0.3
21/01/2013
Carlos Oliver
2
State of the art
0.4
25/02/2013
Carlos Oliver
3
Updated Methodology
0.5
14/10/2013
Carlos Oliver
3,4,5
Final draft
1.0
29/11/2013
Carlos
Oliver,
3,4,5
M.Martin, partners
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
Final version and overall revision
-1-
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Table of Contents
1. INTRODUCTION ............................................................................................................... 16
1.1.
Background .............................................................................................................................16
1.2.
Purpose and Scope .................................................................................................................16
1.3.
Applicable and reference documents ....................................................................................17
1.4.
Document Structure ................................................................................................................20
2. STATE OF THE ART ........................................................................................................ 21
2.1. Definitions ................................................................................................................................21
2.1.1. Risk and insecurity .............................................................................................................21
2.1.2. Security ..............................................................................................................................21
2.1.3. Resilience ...........................................................................................................................22
2.1.4. Terrorism ............................................................................................................................22
2.2. Economic impact of terrorist attacks .....................................................................................23
2.2.1. Direct and indirect costs .....................................................................................................23
2.2.2. Direct effect ........................................................................................................................24
2.2.3. Direct and Indirect micro-economic effect ...........................................................................26
2.2.4. Indirect macroeconomic effect ............................................................................................28
2.3. Scenarios .................................................................................................................................30
2.3.1. Attack with explosives.........................................................................................................31
2.3.2. Arson and IID .....................................................................................................................32
2.3.3. Criminal / Vandalism ...........................................................................................................32
2.3.4. Dispersion of toxic substances ...........................................................................................33
2.3.5. Sabotage ............................................................................................................................33
2.3.6. Computer hacking or cyber-attacks ....................................................................................34
2.3.7. Attacks with small arms ......................................................................................................34
2.3.8. Summary of scenarios ........................................................................................................34
3. METHODOLOGY .............................................................................................................. 36
3.1. Methodology ............................................................................................................................36
3.1.1. Qualitative and quantitative approach .................................................................................36
3.1.2. Risk assessment methodology ...........................................................................................36
3.1.3. Risk mitigation and management ........................................................................................37
3.1.4. Consequences evaluation ..................................................................................................38
3.1.5. Costs of implementing security measures...........................................................................39
3.1.6. Cost efficiency calculation ..................................................................................................39
-2-
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
3.1.7.
1.0
The value of time ............................................................................................................... 42
4. COST BENEFIT ANALYSIS OF THREAT SCENARIOS ................................................. 44
4.1. Costs considered .................................................................................................................... 44
4.1.1. Capital expenditure or CAPEX ........................................................................................... 44
4.1.2. Operational expenditure or OPEX ...................................................................................... 45
4.2. Benefits considered................................................................................................................ 45
4.2.1. Consequences ................................................................................................................... 45
4.2.2. Fatalities and injuries ......................................................................................................... 46
4.2.3. Damages to assets, infrastructure, and reconstruction costs ............................................. 49
4.2.4. Income lost as a result of service disruption ....................................................................... 49
4.2.5. Costs of alternative means of transportation ...................................................................... 50
4.2.6. Income lost due to fear, anxiety, brand image degradation, etc. ........................................ 50
4.3.
Discount rate ........................................................................................................................... 51
4.4.
Results and sensitivity analysis ............................................................................................ 51
4.5. Scenario 1: IED in luggage left in the station’s cafeteria ..................................................... 53
4.5.1. Scenario description .......................................................................................................... 53
4.5.2. Consequences ................................................................................................................... 53
4.5.3. Security measure evaluated............................................................................................... 57
4.5.4. Results and sensitivity analysis .......................................................................................... 60
4.6. Scenario 2: Arson in commercial area .................................................................................. 65
4.6.1. Scenario description .......................................................................................................... 65
4.6.2. Consequences ................................................................................................................... 65
4.6.3. Security measure evaluated............................................................................................... 68
4.6.4. Results and sensitivity analysis .......................................................................................... 72
4.7. Scenario 3: PIH dispersion in platform ................................................................................. 76
4.7.1. Scenario description .......................................................................................................... 76
4.7.2. Consequences ................................................................................................................... 76
4.7.3. Security measure evaluated............................................................................................... 79
4.7.4. Results and sensitivity analysis .......................................................................................... 82
5. CONCLUSIONS ................................................................................................................ 86
5.1.
Direct consequences .............................................................................................................. 86
5.2.
Indirect consequences ........................................................................................................... 87
5.3.
Cost-benefit analysis of security measures.......................................................................... 87
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
-3-
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
List of Figures
Figure 1. Risk reduction from r1 to t2 (two-dimensional view)................................................................... 37
Figure 2. Risk reduction from r1 to t2 (three-dimensional view) ................................................................ 38
Figure 3. Standing crowd density of 0.5 people per square meter ............................................................ 47
Figure 4. Standing crowd density of 1 person per square meter ............................................................... 48
Figure 5. Standing crowd density of 2 people per square meter ............................................................... 48
Figure 6. Scenario 1, IED planted in cafeteria, areas of damage .............................................................. 54
Figure 7. Video monitoring and analytics system diagram ........................................................................ 57
Figure 8. Scenario 1, Net present value of security measure.................................................................... 61
Figure 9. Scenario 1, Net present value of security measure for ρmv 0.5 ................................................... 62
Figure 10. Scenario 1, Net present value of security measure for ρmv 0.9 ................................................. 62
Figure 11. Egress count model for whole station ...................................................................................... 66
Figure 12. Sprinkler system diagram ........................................................................................................ 70
Figure 13 . Scenario 2. Cost-efficiency of security measure for φm=0.2 .................................................... 72
Figure 14. Scenario 2. Cost-efficiency of security measure for φm=0.1 .................................................... 73
Figure 15. Scenario 2. Cost-efficiency of security measure for φm=0.5 .................................................... 74
Figure 16. Example of toxic gas detection units used in a train platform ................................................... 80
Figure 17. Scenario 3. Cost-efficiency of security measure for φm=0.25 ................................................... 82
Figure 18. Scenario 3. Cost-efficiency of security measure for φm=0.1 ..................................................... 83
Figure 19. Scenario 3. Cost-efficiency of security measure for φm=0.5 ..................................................... 84
-4-
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
List of Tables
Table 1 Estimated VSL in different cuntries R[30] .................................................................................... 25
Table 2 Consequences not taken into account in CBA analysis ............................................................... 46
Table 3 VSL values (fatalities and injuries) ............................................................................................... 47
Table 4 People densities used in the study............................................................................................... 49
Table 5. Scenario 1: Number of fatalities and injuries ............................................................................... 55
Table 6. Scenario 1: Consequences of fatalities and injuries .................................................................... 55
Table 7. Average construction rates in 2012 ............................................................................................. 55
Table 8. Scenario 1. Sum of all consequences ......................................................................................... 56
Table 9. Scenario 1, Net present values for different levels of consequences .......................................... 64
Table 10. Scenario 2. Fatalities and injuries ............................................................................................. 67
Table 11. Scenario 2. Sum of all consequences ....................................................................................... 68
Table 12. Cost rates of sprinkler system installation ................................................................................. 70
Table 13 displays the net present values for different levels of consequences and different
probabilities of successful attack Π1 (or PA1 V1). .................................................................... 74
Table 14. Scenario 2, Net present values for different levels of consequences......................................... 75
Table 15. Scenario 3. Fatalities and injuries ............................................................................................. 77
Table 16. Scenario 3. Economic value of fatalities and injuries ................................................................. 77
Table 17. Scenario 3. Sum of all consequences ....................................................................................... 78
Table 18. Scenario 3, Net present values for different levels of consequences......................................... 85
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
-5-
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
List of Acronyms
CBA
Cost/Benefit Analysis
CBRNE
Chemical, Biological, Radiological, Nuclear, Explosive
CCTV
Closed Circuit Television
CFD
Computational Fluid Dynamics
COUNTERACT
Cluster Of User Networks in Transport and Energy Relating to Antiterrorist
Activities
DfT
Department for Transport (UK)
DHS
Department of Homeland Security
DOD
Department of Defense
DOJ
Department of Justice
DOT
Department of Transport
HAZMAT
Hazardous Materials
HVAC
Heating, Ventilation, Air Conditioning
HW
Hardware
IED
Improvised Explosive Device
IID
Improvised Incendiary Device
IM
Infrastructure Manager
ISO
International Standards Organization
IT
Information Technology
PBIED
Person Borne IED
PIH
Poisonous by Inhalation
PTA
Public Transport Authority
PTO
Public Transport Operator
SEST-RAM
SECURESTATION Risk Assessment Methodology
-6-
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
SW
Software
TIM
Toxic Industrial Materials
VBIED
Vehicle Borne IED
VSL
Value of a Statistical Life
WMD
Weapons of Mass Destruction
1.0
List of definitions
Aggressor /
Adversary
Any person seeking to compromise a function or asset.
Antiterrorism
measures
Measures, actions and tactics designed or used to combat terrorism and to
reduce the vulnerability and consequences of individuals, forces, and
property to terrorist acts.
Assessment
The process of acquiring, collecting, processing, examining, analysing,
evaluating, monitoring, and interpreting the data, information, evidence,
objects, measurements, images, sounds, etc., whether tangible or
intangible, to provide a basis for decision making.
Asset
Any person, part or feature of a system that has a value, such as physical
assets, human assets, soft assets (i.e., knowledge, experience) and
information assets.
Attack
A hostile action resulting in the injury or death of persons, or the damage or
destruction of governmental, public and/or private property.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
-7-
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Devices of Chemical, Biological, Radiological and/or Nuclear nature, which
may require a special response, such as post-incident decontamination of
people and/or assets. In particular:
Chemical: dispersion of toxic chemical agents or toxic industrial
materials (TIM) by non-military means, many with little or no clearly
evident characteristics. Symptoms (e.g., passengers collapsing) may
be the first indication of an attack.
CBRN devices
Biological: dispersion of disease-causing living organisms or replicating
entities (viruses) that reproduce or replicate within their host victims
and are used to kill or incapacitate humans, animals or plants.
Radiological: radioactive and/or radio-toxic material spread, usually
through the detonation of conventional explosives, in the form of an
IED or VBIED – as a ‘dirty bomb’.
Nuclear: a nuclear explosion and the consequent thermal and radiation
effects; a weapon of mass destruction potentially requiring a national or
multinational level response.
Closed circuit
television (CCTV)
An electronic system of cameras, control equipment, recorders,
monitors/screens and related apparatus used for surveillance or alarm
assessment.
Consequence
In the context of this project - the outcome of an incident. A single incident
can generate a range of consequences, which can have both positive and
negative effects on objectives. Initial consequences can also escalate
through knock-on effects.
Contamination
The undesirable deposition of a chemical, biological or radiological material
on the surface of structures, areas, objects, or people
Control
Any measure or action that modifies risk. Controls include any policy,
procedure, practice, process, technology, technique, method, or device that
modifies or manages risk. Risk treatments become controls, or modify
existing controls, once they have been implemented.
Controlled area
An area into which access is controlled or limited. It is that portion of a
restricted area usually near or surrounding a limited or exclusion area.
Counterterrorism
Offensive measures taken to prevent, deter, and respond to terrorism.
Crime
Any act or commission of an act that is forbidden, or the omission of a duty
that is commanded by a public law and that makes the offender liable to
punishment.
Crime Prevention
Through
Environmental
Design (CPTED)
-8-
A multi-disciplinary approach to limit the opportunities for crime by focusing
on design and the creation of an environment not tolerating crime.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Crisis
A situation, derived from natural or man-made causes, which has the
potential to compromise the safety (physical, economic, environmental etc.)
of an individual, a group, a community or an entire society. A crisis usually
triggers particular modes of governance, typically described with the terms
crisis (or emergency) management (or response).
Critical asset
An asset (human or material) the loss, denial or damage of which would
substantially compromise the main functions of the system / organization.
Critical
infrastructure
Assets, systems, and networks, whether physical or virtual, so vital to the
nation that the incapacitation or destruction of such assets, systems, or
networks would have a debilitating impact on security, national economic
security, national public health or safety, or any combination of the above.
Cyber attack
Damage, unauthorized use, exploitation or destruction of electronic
information by means such as viruses, worms, Trojan horses, phishing,
denial of service (DoS) attacks, unauthorized access and control system
attacks.
Cyber security
All means for protection against cyber-attacks, e.g. firewalls, anti-virus
software, intrusion detection and prevention systems, encryption, etc.
Decontamination
The reduction or removal of a chemical, biological, or radiological material
from the surface of a structure, area, object, or person.
Design Basis
Threat (DBT)
A set of assumptions regarding threats (number of adversaries, their modus
operandi, the type of tools and weapons they employ, etc.), to serve as a
point of reference when planning and designing the security systems /
measures to be implemented.
Emergency
An unforeseen or unplanned situation that has implications on the safety of
persons and assets and requires immediate attention.
Emergency
Operating
Procedure (EOP)
A pre-planned documented arrangement for managing or executing a set of
actions in an emergency situation, to ensure the safety of the people and a
predefined level of operations and/or services.
Emergency
services / First
responders
The external bodies, including, but not limited to, fire brigades, police and
medical units arriving to provide initial services when incidents occur,.
Explosive device
Explosive
Ordnance Disposal
(EOD)
Device, comprising explosive (or explosive components) and a detonator,
designed to cause an explosion. Explosive devices include military
ordnance, civil and industrial devices as well as improvised devices (IED)
meant to be used for terrorist or criminal acts.
Actions performed by specialists to neutralize devices such as IEDs, IIDs or
VBIEDs (see below).
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
-9-
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Hazardous
Materials
(HAZMAT)
Solids, liquids, or gases that can harm people, other living organisms,
property, or the environment, including materials that are radioactive,
flammable, explosive, corrosive, oxidizing, asphyxiating, bio-hazardous,
toxic, pathogenic or allergenic. They are grouped by class, e.g., Class 1
Explosives, and identified by a United Nations number, e.g., 1005
Anhydrous Ammonia.
Hijack
The act of taking control of a vehicle (on land, sea or air) for terrorist or
criminal purposes. The use of the term hijack has been extended to the
virtual world (hijack a computer system, hijack someone’s identity etc.)
Impact
The consequences of an incident – harm to persons, physical damage,
direct and indirect costs- such as damage to reputation or perception of
security.
Improvised
Explosive Device
(IED)
An explosive device produced using available materials, e.g., timing
devices, means of detonation, explosives (commercially available or
improvised, i.e., ‘home made’) and articles, such as nails for additional
impact. IEDs may use components of military explosive articles and also
contain incendiary materials. A remote controlled device or timer
mechanism may be used for initiation.
Improvised
Incendiary Device
(IID)
A device produced from available flammable materials, intended to set fire
to the target and cause serious harm to persons and/or damage to assets
from the heat and the dense and toxic fumes produced, An IID may be
initiated manually on site, e.g., a Molotov cocktail, by a timer mechanism or
a remote controlled device. An IID may be combined with an IED.
Improvised
Radiological
Device (IRD)
A device intended to spread radioactive material, most commonly the spent
fuel from nuclear power plants or radioactive medical waste, usually by
conventional explosives, with the intention to harm, kill and/or cause major
disruption. Also known as a 'dirty bomb'. It is not a nuclear weapon as it
does not cause a nuclear explosion.
Infrastructure
Manager
The organisation responsible for providing, maintaining and controlling the
use of the infrastructure serving public transport operators. This
responsibility may be combined with that of a PTO.
Incident
Something that has happened and is likely to lead to some consequences.
It includes events of both internal and external causes, deliberate or
accidental, and not necessarily of negative consequences. In that sense, it
is a more general term than accident.
Intrusion detection
systems
Sensor based (optical, microwave, vibration, etc.) systems designed for the
detection (and consequent alarm) of intruders crossing a perimeter or
entering a protected area; they can be classified into perimeter protection
systems (along fences, open spaces, etc.) or built spaces.
- 10 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
K9
K9 or K-9 is an abbreviation and homophone of 'canine', and refers to the
use of police / army dogs such as those used for bomb or drug sniffing.
Level of risk
Risk magnitude, estimated by considering and combining consequences
and likelihood. A level of risk can be assigned to a single risk or to a
combination of risks. In the context of this project - a consequence is the
outcome of an event and has an effect on objectives. Likelihood is the
chance that something might happen.
Likelihood
The chance that something might happen. Likelihood can be defined,
determined, or measured objectively or subjectively, and can be expressed
either qualitatively or quantitatively (using mathematics).
Mitigation
Reduction the loss of life and damage to property from natural and/or
manmade disasters by avoiding or lessening the impact of a disaster.
Operations
Concept (CONOP)
A written document describing an overall picture of an operation or series of
operations frequently embodying operational strategies, methods,
principles, plans, policies also organization and command structures. It
identifies connected or separate operations to be carried out simultaneously
or in succession, by the entire organization or by one or more of its
operational bodies.
Perimeter security
A system of technical means, personnel and procedures aiming to ensure
that no one enters (or exits) a defined area except through the controlled
access points. It has three essential functions: Deter, Delay (or deny) and
Detect (& document) any intrusion; sometimes referred to as 3D.
Personal
Protective
Equipment (PPE)
Protective clothing, helmets, goggles, other garments or equipment
designed to protect the wearer's body from injury due to blunt impact,
electrical hazards, heat, chemicals and infection.
Poisonous by
Inhalation (PIH)
A gas that is (or is presumed to be) toxic to humans to a degree posing a
hazard to their health if inhaled even in minute concentrations.
Protective
measures
Elements of a protective system that protect an asset against a threat.
Protective measures are divided into defensive and detection measures.
Protective system
An integration of all of the protective measures required to protect an asset
against the range of threats applicable to it.
PTZ camera
A camera that has the capacity to pan, tilt and zoom, usually via remote
control, but at times also in automatic mode.
Public area
An area that is meant to be accessible to the general public; it can be an
area with free or limited access. In the latter case, access control is
generally limited to entitlement (confirmed by a ticket or an access/travel
card, but not identity control)
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 11 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Public entity
Body / organization, not necessarily of public (state) ownership, but of a
public character (i.e., serving the public or ensuring a public function).
Public
infrastructure
All infrastructures (i.e., equipment, constructions and areas) that are meant
to be at the service of the general public rather than the various specific
actors or professionals.
Public transport
operator
An organisation, public or private, that manages the operations of public
transport services concerned with the mass mobility of citizens. This
includes main line railway undertakings, metro, tram and bus operators
including their support facilities, such as rolling stock and maintenance
facilities, and involves international, national, suburban or urban networks.
Main line rail PTOs are also known as railway undertakings. A PTO may
also be an infrastructure manager.
Residual risk
The risk left over after a risk treatment option has been implemented. It is
the risk remaining after the risk level has been reduced, the source of the
risk removed the consequences modified, the probabilities changed and the
risk transferred or retained.
Risk can be defined in a number of ways:
The potential that a chosen action or activity (including the choice of
inaction) will lead to a loss (an undesirable outcome) - according to ISO
31000
Or:
Risk
The combination of the probability of an event and its consequences
(ISO/IEC Guide 73). In all types of undertakings, there is the potential for
events and consequences that constitute opportunities for benefit (upside)
or threats to success (downside).
Or:
The threat that an event or action will adversely affect an organization’s
ability to achieve its objectives and to successfully execute its strategies.
Risk (security)
The degree of exposure to a threat. The risk increases with the potential
impact and the probability of a threat materializing. Risk is measured in
escalating categories.
Risk assessment /
analysis
A step in a risk management procedure: the determination of a quantitative
or qualitative value of risk related to a concrete situation and a recognized
threat (or hazard). Quantitative risk assessment requires calculations of two
components of risk: R, the magnitude of the potential loss L and the
probability P that the loss will occur. Qualitative risk assessment is usually
performed where statistical data for a quantitative assessment is
unavailable. It usually involves the use of score matrices.
- 12 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Risk based
approach
A security risk management approach, based on categorization of the risk
level following a risk assessment, selection of risk mitigation safeguards
based on cost-benefit considerations, operational and technical feasibility,
and accepted risk management strategies.
Risk evaluation
A process that is used to compare risk analysis results with risk criteria, in
order to determine whether or not a specified level of risk is acceptable or
tolerable.
Risk identification
Sets out to identify an organization’s exposure to uncertainty. This requires
intimate knowledge of the organization; the market in which it operates; the
legal, social, political and cultural environment in which it exists; as well as
the development of a sound understanding of its strategic and operational
objectives, including factors critical to its success and the threats and
opportunities related to the achievement of these objectives (ISO/IEC
Guide 73).
Risk management
The identification, assessment, and prioritization of risks followed by
coordinated and efficient application of resources to minimize, monitor, and
control the probability and/or impact of unfortunate events, or to maximize
the realization of opportunities.
Risk management
plan
Describes how the organization intends to manage risk. It details the
management components, the approach, and the resources that will be
used to manage risk. Typical management components include
procedures, practices, responsibilities, and activities (including their
sequence and timing). Risk management plans can be applied to products,
processes, and projects, or to an entire organization or to any part of it.
Risk management
process
A process that systematically applies management policies, procedures
and practices to a set of activities intended to establish the context;
communicate and consult with stakeholders; and identify, analyses,
evaluate, treat, monitor and review risk.
Risk treatment
The process of selecting and implementing measures to reduce the risk.
Risk treatment includes, as its major element, risk control/mitigation, but
extends further to, for example, risk avoidance, risk transfer, risk financing,
etc.
Sabotage
Tampering intended to undermine the integrity of systems with the objective
of causing damage to assets, and/or harm to humans, and disrupting
routine operations; e.g., causing derailment, interfering with signalling,
power supply or communications systems.
Safety
The state of being free of risk or danger (natural or accidental); being in
control of recognized hazards and reducing risk of harm or damage as low
as reasonably practicable. The term ‘safe’, when used as an attribute,
encompasses all measures, actions or systems aiming at ensuring the state
of safety.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 13 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Safety incident
An accidental event, of internal or external causes, that is likely to lead to
some negative consequences and compromise safety.
Security
The degree of protection against intentional danger, damage or loss
Also:
The set of means / actions through which safety is ensured, in particular
against intentional threats. Thus, the term ‘security’ encompasses all
measures, actions or systems aiming at preventing intentional threats from
compromising safety.
Security incident
Deliberate act intended to harm and injure persons and/or damage
equipment and infrastructure, disrupt operations and compromise safety.
Security plan
A document, usually based on the results of a security risk assessment,
defining the management chain and responsibilities in relation to security
and detailing the measures (protective and reactive) such as procedures,
systems, methods and staff, implemented at a particular facility or
organization for its protection against security threats and in response to
security incidents.
Security regulator
(Security
regulating body)
A public entity, governmental or recognized by the government, that is
responsible for defining statutory security requirements and for ensuring
their application.
Security risk
assessment
A process used to systematically analyses potential threats to a specific
target. The process includes identifying and classifying assets by their
criticality; the analysis of a range of potential threats and their probability of
being realized, and their potential impact. A vulnerability assessment may
be performed as part of a risk assessment.
Security risk
management
The process of identifying security risks and selecting and implementing
strategies to treat them.
Security threat
The expression of intention (or perception of a possible intention) to
provoke a security incident, i.e., to harm or injure persons, damage
equipment and infrastructure, disrupt operations, etc. Security threats may
materialize into security incidents that are a concern for safety.
Site (of an incident)
The area in which the response to an incident is managed.
Standard
Operating
Procedure (SOP)
A pre-planned documented
management of a task.
Surveillance
- 14 -
arrangement
for
safe
and
effective
Observation from a distance, usually by means of electronic equipment
(such as CCTV cameras) or, sometimes, by no- or low-technology methods
such as human agents.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Tactics
The deployment and directing of resources to handle an incident, in order to
accomplish the objectives defined by the organization’s strategy.
Terrorism
The intentional and unlawful use of force / violence, deliberately targeting or
disregarding the safety of civilians, with the intention of inflicting significant
harm to persons and/or damage to property; causing panic and fear;
intimidating or coercing a government or a civilian population to further a
religious, political or ideological goal.
Threat (specific)
A threat, which may indicate a particular time and target, e.g., a train,
station or other asset, and which may relate to the use of any type of tactic.
Specific threats may or may not result in an actual incident, but can result in
serious operational disruption, safety and cost issues.
Toxic Industrial
Materials (TIM)
A general description of any substance that is poisonous or harmful to
humans, animals, plant life or the environment.
Vehicle Borne
Improvised
Explosive Device
(VBIED)
An IED carried by a vehicle – usually containing a large amount of
explosives, intended to cause maximum fatalities and damage.
Vulnerability
A weakness, e.g., in physical structures, personnel protection systems,
process or other areas that may be exploited by adversaries
Also:
the probability or likelihood that an attack is successful in causing the
intended consequences.
Value of a
statistical life
Represents is the marginal cost of death prevention in a certain class of
circumstances. The VSL is the value that an individual places on a marginal
change in their likelihood of death.
Vulnerability
assessment
Any review, audit or other examination of the security of a public transport
infrastructure asset to determine its susceptibility to unlawful interference,
whether during conception, planning, design, construction, operation, or
decommissioning.
Also:
Evaluating the probability or likelihood that an attack is successful in
causing the intended consequences.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 15 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
1.
Introduction
1.1.
Background
The aim of the SECURESTATION project is to improve the resilience of passenger station and terminal
to terrorist attacks and safety accidents through technologies and methodologies enabling design to
reduce the impact of blast, fire and the dispersion of toxic agents on passengers, staff and
infrastructure.
One of the objectives of the project is to assess and facilitate the implementation of the
SECURESTTION results, a quantitative risk assessment methodology and a design handbook. As
such, one the relevant aspects is the socio-economic impact of the proposed security measures to
enhance the overall resilience of the passenger station infrastructures.
Socio economic impact analysis can help in determining whether the risk reduction measures under
consideration are necessary or desirable. It addresses the following:
how identified risks can be reduced through a risk assessment
what are the related benefits
who will be impacted by the measures being proposed
what will be the cost of implementing various security measures
how this cost will be distributed.
1.2.
Purpose and Scope
In recent years the level and perception of fear of personal security has greatly increased, mostly due
to the quantity of news about criminality levels and catastrophic events, which have had a great impact
on citizens and society, raising the feeling of insecurity.
The purpose of this document is to analyse the socio-economic impact in designing passenger
terminals and stations in order to achieve increased safety and security.
A terrorist attack can have severe consequences for both victims and society in general. The impact of
an attack can be classified in two groups: direct consequences and indirect consequences.
Direct consequences can be considered to be those that take place as an immediate result of the
attack, such as damage to buildings and property and loss of life and injuries. On the other hand,
indirect consequences are those that emanate from a change in the behaviour in society as a result of
the attack, such as changes in lifestyle, investment and consumption patterns, etc.
While direct consequences are usually straight forward to calculate, indirect consequences are more
difficult to estimate, and largely depend on factors such as the magnitude of the terrorist attack,
whether the attack is isolated or is part of a campaign of attacks, the perpetrators of the attack, the
country, and the method used for the attack, etc.
This document tries to describe both direct and indirect consequences of a terrorist attack based on
methodology, simulations and results from other SECURESTATION work packages R[1-3] together
- 16 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
with published studies. It also provides a tool to perform cost benefit analysis of security measures,
estimating direct and indirect impacts for several scenarios.
1.3.
Applicable and reference documents
– SECURESTATION Risk
R 1.
SECURESTATION, SECURESTATION DELIVERABLE 3.2
assessment methodology (SEST-RAM). 2012.
R 2.
SECURESTATION, SECURESTATION DELIVERABLE D6.2 – Modelling And Simulation
Results Of Passengers Behaviour And Movement In Emergency Situations. 2012.
R 3.
SECURESTATION, SECURESTATION DELIVERABLE D5.1 – Physical
methodological approaches. Part B - Chemical dispersion modelling. 2012.
R 4.
John Mueller and Mark G Stewart, Terror, security, and money: Balancing the risks, benefits,
and costs of homeland security 2011: Oxford University Press.
R 5.
Walter Enders and Todd Sandler, Patterns of transnational terrorism, 1970–1999: alternative
time series estimates. International Studies Quarterly, 2002. 46(2): p. 145-165.
R 6.
Walter Enders and Todd Sandler, The political economy of terrorism
University Press.
R 7.
Adam Z Rose, A framework for analyzing the total economic impacts of terrorist attacks and
natural disasters. Journal of Homeland Security and Emergency Management, 2009. 6(1).
R 8.
ASIS International and ASIS International Commission on Guidelines, ASIS General Security
Risk Assessment Guideline 2003: ASIS International.
R 9.
Adam Rose and Samrat Chatterjee, Benefits and Costs of Counter-Terrorism Security
Measures in Urban Areas May 5, 2011. 2011.
resilience
2006: Cambridge
R 10. Discussion paper “Security, risk perception and cost-benefit analysis", in JOINT TRANSPORT
RESEARCH CENTRE. Round Table, 11-12 December 2008, Paris. 2009.
R 11. Discussion Paper "Improving the Practice of Cost Benefit Analysis in Transport.", in Summary
and Conclusions of the Roundtable on Improving the Practice of Cost Benefit Analysis in
Transport (21-22 October 2010, Queretaro, Mexico) 2010.
R 12. Guidance for conducting retrospective studies on socio-economic analysis - Environment
Directorate - Organization for economic co-operation and development. Paris 1999.
R 13. Tilman Brück, Marie Karaisl, and Friedrich Schneider, A Survey on the Economics of Security
2008: DIW.
R 14. John Mueller and Mershon Center, Establishing principles for evaluating measures designed to
protect the homeland from terrorism. Department of Political Science, Ohio State University,
Columbus, 2009.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 17 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
R 15. Alberto Abadie and Javier Gardeazabal, The economic costs of conflict: A case study of the
Basque Country. American economic review, 2003: p. 113-132.
R 16. Walter Enders and Todd Sandler, Causality between transnational terrorism and tourism: The
case of Spain. Studies in Conflict & Terrorism, 1991. 14(1): p. 49-58.
R 17. Walter Enders and Todd Sandler, Terrorism and foreign direct investment in Spain and Greece.
Kyklos, 1996. 49(3): p. 331-352.
R 18. Zvi Eckstein and Daniel Tsiddon, Macroeconomic consequences of terror: theory and the case
of Israel. Journal of Monetary Economics, 2004. 51(5): p. 971-1002.
R 19. David Fielding, Modelling political instability and economic performance: Israeli investment
during the intifada. Economica, 2003. 70(277): p. 159-186.
R 20. Rafi Eldor and Rafi Melnick, Financial markets and terrorism. European Journal of Political
Economy, 2004. 20(2): p. 367-386.
R 21. Andrew H Chen and Thomas F Siems, The effects of terrorism on global capital markets.
European Journal of Political Economy, 2004. 20(2): p. 349-366.
R 22. Volker Nitsch and Dieter Schumacher, Terrorism and international trade: an empirical
investigation. European Journal of Political Economy, 2004. 20(2): p. 423-433.
R 23. Socio Economic impact analysis- HAL web-page http://www.hal.ca/index.php/services/
R 24. Walter Enders and Eric Olson, Measuring the economic costs of terrorism
Handbook of the Economics of Peace and Conflict.
2011: Oxford
R 25. Peter Navarro and Aron Spencer, Assessing the Costs of Terrorism. Milken Institute Review,
2001: p. 17-31.
R 26. Howard Kunreuther, Erwann Michel-Kerjan, and Beverly Porter, Assessing, managing, and
financing extreme events: Dealing with terrorism,
2003, National Bureau of Economic
Research.
R 27. M Elisabeth Paté-Cornell, Quantitative safety goals for risk management of industrial facilities.
Structural Safety, 1994. 13(3): p. 145-157.
R 28. Elena Ryan, US Customs, Border Protection, and Lisa A Robinson, Valuing Mortality Risk
Reductions in Homeland Security Regulatory Analyses. 2008.
R 29. HEATCO PROJECT http://heatco.ier.uni-stuttgart.de/.
R 30. J Nellthorp, T Sansom, P Bickel, C Doll, and G Lindberg, Valuation conventions for UNITE,
UNITE (UNIfication of accounts and marginal costs for Transport Efficiency), 5th Framework
RTD Programme. ITS, University of Leeds, Leeds, 2001.
- 18 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
R 31. Mikel Buesa, Aurelia Valino, Joost Heijs, Thomas Baumert, and Javier Gonzalez Gomez, The
Economic Cost of March 11: Measuring the direct economic cost of the terrorist attack on March
11, 2004 in Madrid. Terrorism and Political Violence, 2007. 19(4): p. 489-509.
R 32. Dick Kazuyuki Nanto. 9/11 Terrorism: Global Economic Costs.
Information Service, Library of Congress.
2004. Congressional
R 33. Friedrich G Schneider, Tilman Brück, and Daniel Meierrieks, The economics of terrorism and
counter-terrorism: A survey (Part II), 2010, CESifo working paper Public Finance.
R 34. Bruno S Frey, Simon Luechinger, and Alois Stutzer, The life satisfaction approach to valuing
public goods: The case of terrorism. Public Choice, 2009. 138(3-4): p. 317-345.
R 35. Todd Sandler and Walter Enders, Economic consequences of terrorism in developed and
developing countries. Terrorism, economic development, and political openness, 2005: p. 17.
R 36. Dotan Persitz. The Economic effects of terrorism: counterfactual analysis of the case of israel.
in AEA Conference Paper. 2007.
R 37. Nikos Litinas Amalia Polydoropoulou, Athena Tsirimpa, Maria Kamargianni, Understanding the
Factors Causing Travelers’ Feelings of Security in Ports. 12th World Conference of Transport
Research (WCTR), Lisbon, Portugal, July 2010, 2010.
R 38. Edward Richards, Terry O'Brien, and Katharine Rathbun, Bioterrorism and the Use of Fear in
Public Health. Urban Lawyer, 2002. 34: p. 686.
R 39. Alexander Ramseger, Martin B Kalinowski, and Lucia Weiß, CBRN Threats and the Economic
Analysis of Terrorism 2009: NEAT, Network for the Economic Analysis of Terrorism.
R 40. Robyn Pangi, Consequence management in the 1995 sarin attacks on the Japanese subway
system. Studies in Conflict and Terrorism, 2002. 25(6): p. 421-448.
R 41. Network Rail Limited. Annual report and accounts 2013. www.networkrail.co.uk. 2013.
R 42. David William Pearce and David Ulph, A social discount rate for the United Kingdom 1995:
CSERGE Norwich.
R 43. Turner And Townsend. Turner & Townsend. International construction cost survey 2012
http://www.turnerandtownsend.com/construction-cost-2012/_16803.html. 2012.
R 44. Corinne Williams, Jeremy Fraser-Mitchell, Stuart Campbell, and R Harrison, Effectiveness of
sprinklers in residential premises. BRE report, 2004. 204505.
R 45. Ganapathy Ramachandran, The economics of fire protection 2002: Taylor & Francis.
R 46. R Rutstein and R.A. Cooke, The Value of Fire Protection in Buildings, Fire Research Report
16/78, London: Home Office Scientific Advisory Branch. 1979.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 19 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
R 47. A Cost Benefit Analysis of Options to Reduce the Risk of Fire and Rescue in Areas of New
Build Homes Department for Communities and Local Government, UK. Fire Research Series
1/2010. February 2010, 2010.
R 48.
“Police Raid Cult, Find Gas Solvent -- Probe Of Tokyo Subway Attack”. 22 May 1995 Available
from: Seattle Times News Services.
R 49. Alim Ahmed Fatah, Guide for the selection of chemical agent and toxic industrial material
detection equipment for emergency first responders. Vol. 100. 2000: US Department of Justice,
Office of Justice Program, National Institute of Justice.
1.4.
Document Structure
Chapter 1 - “Introduction” provides a background concerning the deliverable, the purpose and scope,
the document structure and applicable and reference documents used for its elaboration.
Chapter 2 - “State of the art” is a brief summary of several concepts that affect the strategy and
methodology applied in the production of this deliverable.
Chapter 3 – “Methodology” describes the methodology used to analyse the inputs available from other
deliverables.
Chapter 4 - “Cost-benefit analysis of threat scenarios” provides a break-down and evaluation of both
direct and indirect costs and benefits.
Chapter 5 – “Conclusions” summarizes the findings and results from the analysis phase and lays out
the main conclusions from them.
- 20 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
2.
State of the art
2.1.
Definitions
2.1.1.
1.0
Risk and insecurity
Insecurity is defined as the “aggregate, unquantifiable form of risk” and consequently security as the
absence of risk, i.e. zero probability for a harmful event to happen.
Risk is a known entity to the extent that its probability can be estimated, e.g. based on certain variables
which have been derived historically or through research; yet uncertainty implies the impossibility of
quantifying the likelihood of an event happening. In sharp contrast to natural disasters that are
somewhat predictable, terrorists deliberately seek to evade attempts for prediction thus increasing
uncertainty or creating an environment of “dynamic insecurity”
Not all threats of the same type are equally important considering that the threat of terrorism is dynamic
and able to adapt to current conditions which affect the likelihood of attack success R[4].
Any protective policy should be compared to a “do nothing case” where the money saved is used to
rebuild and compensate any victims. Given the low probability for an individual target to be hit, the
ability of terrorists to redirect their focus from one target to another and the cost of rebuilding an
attacked target, policy makers have to consider whether the proposed policy is more cost effective than
refraining from spending on a potential target or set of targets and then using the money saved to
rebuild, repair and compensate in case an attack on the target actually takes place.
As terrorism inflicts not only direct, but also indirect, costs R[5], it is obvious that any sensible
antiterrorism policy proposal must consider both direct and indirect cost that might flow from the policy.
While the direct cost of security measures is clearly sizeable, indirect costs appear frequently to be
ignored, since it is very difficult to estimate them accurately.
Protection policies may also undesirably enhance fear and anxiety which can have negative
consequences on health. An extreme example of how severe can these health effects can become is
the Chernobyl nuclear disaster of 1986.
It has been found that the largest health consequences came not from the accident itself (less than 50
people died directly from radiation exposure), but from the negative and often life-expectancy reducing
impact of the mental health of people traumatized by relocation and by lingering, and what turned out to
be massively exaggerated, fears that they would soon die of cancer.
It follows that protection and other policies that enhance fear unrealistically (as happened most notably
in Chernobyl) can have significant negative health consequences.
2.1.2.
Security
Security is now being addressed by enhancing systemic resilience in order to minimize negative
impacts if an attack occurs rather than seeking to protect potential targets against all possible risk
factors. It is believed that it may be more sustainable to minimize vulnerabilities and increase resilience
instead of focusing on particular instances of insecurity.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 21 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Vulnerability is related to insecurity in the sense that the risk is defined not just by the threat per se but
also by the degree of systemic vulnerability. In current systems, there are interdependencies that cause
a local event to have global repercussions and as a result, a system of interconnected elements, has
its security defined by the vulnerability of its weakest element.
As individual decisions to invest in security are made independently the overall security of a system of
elements is partly dependent of these decisions. Therefore, it is important to have the right coordination
mechanisms to avoid uncertainty about the investment behaviour of others. Such uncertainty could
lead to sub-optimal levels of security.
The inner characteristics of the provision of security are such that some security investments can lead
to provide security benefits to a large group of individuals or to society at large while other security
measures only deliver benefits for the investor. For example, security measures put in place locally in
one country can provide improvements to the residents of the country, however, policies that target the
capture of terrorist leaders, or the dismantlement of a terrorist cell carry benefits to all the countries
targeted by the terrorists.
Although, theoretical models suggest that coordinated policies may yield higher benefits for all, it is
believed R[6] that protective policies are generally preferred due to the free rider effect (where others
can benefit from resources, goods, or services without paying for the cost) of more proactive measures
at an international level.
2.1.3.
Resilience
Resilience refers to the ability of an entity or system to maintain function when shocked. It is thus
aligned with the fundamental economic problem--efficient allocation of resources, which is made all the
more challenging by a disaster R[7]. Resilience is considered as static because it can be achieved
without repair or reconstruction work which may affect the level of activity.
There are other definitions which incorporate dynamic aspects, such as the capacity of a system or
entity to recover from a severe shock and return to a desired state (of activity). This aspect implies that
the system is able to recover from the shock, which may not be always the case.
2.1.4.
Terrorism
Terrorism can be defined as the premeditated use or threat of use of extra-normal violence or brutality
by sub-national groups to obtain a political, religious, or ideological objective through intimidation of a
huge audience, usually not directly involved with the policymaking that the terrorists seek to influence
R[5].
However this definition does not encompass the wide variety of manifestations across the world and
historically, for example, there are large versus small scale attacks; continued versus isolated incidents;
and domestic versus transnational terrorism. Depending on the type of terrorism the security measures
may vary to provide a more effective protection.
- 22 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
2.2.
1.0
Economic impact of terrorist attacks
A terrorist attack can have dramatic consequences for both victims and society in general. The
estimation of its effects has taken a prominent role in the literature, and in some cases it has helped to
guide policy decisions R[8-11].
Although assigning monetary values to concepts like human life can be controversial, the use of a
common denominator when assessing the effects of a terrorist attack can help provide insight when
assessing the adequacy of implementing security measures. Through cost-benefit analysis it is
possible to make decisions that maximize the use of financial resources in security R[12-14].
When analysing the economic effect of a terrorist attack, the attack itself has to be put in context.
Isolated attacks have different consequences to similar attacks that are part of a campaign, for
example, as the level of fear and insecurity in the general public can be much higher when the attack is
part of a series, and can have a stronger influence in purchase and investing decisions. Therefore,
equal attacks in different contexts can have different economic effects.
Some costs and effects of terrorist attacks are difficult to evaluate, especially those that affect in an
indirect form the operation of the economic system. There are studies that measure the effects of
terrorism on some sectors of the economy, financial markets or the general economic output of a
country, see R[15-21] . But to date, there is no general model that can be applied in order to quantify
the indirect effects of a terrorist attack or a series of attacks.
Studies R[7, 15-18, 20-22] show that, in general, terrorism has a detrimental effect on the economy of
the affected country or area, but the investigations focus on particular periods of time in specific places.
Therefore, for an accurate calculation of all the consequences of a particular attack, an in-depth study
has to be performed, taking into account all socio-economic factors R[23] and the context in which the
attack takes place. If an isolated attack is taken and the context is not defined, many indirect
consequences have to be qualitatively described as it is not possible to quantify them.
The economic effects can be categorized according to different dimensions. The most common
classification found in the literature is direct and indirect. Direct costs are those that take place as an
immediate result of the attack, such as damage to buildings and property and loss of life and injuries.
Indirect costs are those that result from a change in the behaviour of the economic system as a
consequence of the attack, such as changes in lifestyle, investment and consumption patterns, new
security measures put in place, etc. Costs can also be categorized according to the temporal
dimension in short and long term costs. Short-term costs materialize in the aftermath of the attack and
tend to disappear a few days afterwards. Short-term costs include first-response, hospitalization,
isolation of the affected area, etc. Long term costs take effect from the moment of the attack and
remain for a long period of time, years in some cases.
2.2.1.
Direct and indirect costs
Direct economic costs are seen, in general, as costs that occur as the direct consequence of the
destruction of physical assets. They comprise property, goods and infrastructures losses, and the value
of lives lost, etcetera.
Direct economic costs tend to be proportional to the magnitude of the attack, and the size and the
characteristics of the economy hit, at a local, regional and national level. In contrast, indirect costs
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 23 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
include costs relating to the implementation of security measures in response to the terrorist attacks.
They also comprise costs tied to attack-induced long term changes in commerce, saving patterns,
investment, etc.
Additionally, indirect costs are the result of behavioural change in the public, which can induce a
decline of consumer and investor confidence, resulting in reductions in demands and shifts in
investment patterns. Therefore, indirect costs may materialize as reduced growth in GDP, decrease of
foreign direct investment, inflation and increased unemployment.
2.2.2.
2.2.2.1.
Direct effect
Direct damage and value of life
Direct damage includes the destruction of property and fatalities or injuries as a consequence of the
attack on the target and surrounding area. Estimating these impacts requires accounting for the
physical destruction of buildings and infrastructure and losses of human life or capabilities (through
injury) but also for the economic impacts resulting from actions to mitigate damages. In the case of an
attack with explosives, the property damage can be the dominant cost but in chemical and biological or
small arms attacks these effect may not be significant compared with the effect of business interruption
R[7].
Considering the case of the World Trade Centre attacks in 2001, as reported by Enders and Olson
R[24]the direct costs of the attacks included private property destruction (including the value of four
airplanes) of $14 billion and the loss of $2,2 billion of government entities. Wages and salaries lost as a
result of the work stoppage were $2,5 billion, and clean-up costs were estimated at $10 billion. Navarro
and Spencer R[25] calculate a total output loss of $47 billion as a consequence of the disruption
caused by the attack. Kunreuther. R[26] adds to the direct losses mentioned, the lost income from
business disruptions related to the attack and estimate that the total loss is in the range of $80-$90
billion.
Fatalities and injuries are in most cases the main impact of a terrorist attack, whatever the scenario.
One of the more controversial issues associated with cost–benefit analyses is how to place a monetary
value on human life.
There is no consensus for a standard definition for the value of a specific human life. However, an
examination of risk/reward trade-offs that the general public make with regard to their health, has
helped to develop the concept of the value of a statistical life VSL The VSL is the value that an
individual places on a marginal change in their likelihood of death, that is, how much the individual is
ready to spend in order to reduce the risk of death by a particular amount in a given period of time. It is
necessary to note that the VSL is different from the value of an actual life. It is the value placed on
changes in the likelihood of death. VSL = Willingness to pay /change in risk.
Several publications such as M.E. Paté-Cornell R[27] and Robinson R[28] place the value of a
statistical life somewhere between $2-$6,3 million.
The HEATCO project R[29] produced a series of recommendations regarding values of statistical life to
be used in the appraisal of transport investments, which in turn, are based on the recommendations by
the UNITE project R[30]. The recommendations of values are listed in the table below in 2002 prices.
- 24 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
Country
Austria
Belgium
Cyprus
Czech Republic
Denmark
Estonia
Finland
France
Germany
Greece
Hungary
Ireland
Italy
Latvia
Lithuania
Luxembourg
Malta
Netherlands
Norway
Poland
Portugal
Slovakia
Slovenia
Spain
Sweden
Switzerland
United Kingdom
Fatality
1,760,000 €
1,639,000 €
704,000 €
495,000 €
2,200,000 €
352,000 €
1,738,000 €
1,617,000 €
1,661,000 €
836,000 €
440,000 €
2,134,000 €
1,430,000 €
275,000 €
275,000 €
2,332,000 €
1,001,000 €
1,782,000 €
2,893,000 €
341,000 €
803,000 €
308,000 €
759,000 €
1,122,000 €
1,870,000 €
2,574,000 €
1,815,000 €
Severe injury
240,300 €
249,000 €
92,900 €
67,100 €
272,300 €
46,500 €
230,600 €
225,800 €
229,400 €
109,500 €
59,000 €
270,100 €
183,700 €
36,700 €
38,000 €
363,700 €
127,800 €
236,600 €
406,000 €
46,500 €
107,400 €
42,100 €
99,000 €
138,900 €
273,300 €
353,800 €
235,100 €
1.0
Slight injury
19,000 €
16,000 €
6,800 €
4,800 €
21,300 €
3,400 €
17,300 €
17,000 €
18,600 €
8,400 €
4,300 €
20,700 €
14,100 €
2,700 €
2,700 €
21,900 €
9,500 €
19,000 €
29,100 €
3,300 €
7,400 €
3,000 €
7,300 €
10,500 €
19,700 €
27,100 €
18,600 €
Table 1 Estimated VSL in different cuntries R[30]
These values can be used to estimate the economic value of fatalities and injuries as a consequence of
a terrorist attack.
2.2.2.2.
First response
First response costs include the costs to alleviate the consequences of the attack on the people
affected. These costs would include medical attention to injured people, evacuation, sealing off the
perimeter to avoid further fatalities, containment of contaminants (in case of an attack with poisonous
substances), decontamination of the affected area and surrounding services, etc.
The Madrid attacks in 2004 R[31] resulted in high economic costs due to the scattered form of the
attack. The cost of the rescue activities and initial attention for the victims of the attack was estimated
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 25 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
at €2.17 million; however this figure did not take into account the cost of the mobilization of the national
police, nor on the civilians that participated in them voluntarily. The cost of health care to the victims
rose to €5.15 million, which includes all hospitalized and non-hospitalized injured.
2.2.2.3.
Compensation to victims
The loss of human lives is always a delicate matter; however, it is clear that fatalities and permanent
physical disabilities involve an important cost for the whole society. Governments try to alleviate this
loss by offering compensation to victims of terrorist attacks. The compensations for the victims are
normally based on national legislation that establishes the minimum compensation and can be modified
by judicial action.
Some studies have calculated the compensation paid to victims of attacks. For the 9/11 attacks it is
estimated a total of $7000 million paid in compensation claims R[32]. In the case of the Madrid train
bombings in 2004 a total of €134 million R[31] were paid by the government and private insurers.
2.2.3.
Direct and Indirect micro-economic effect
When evaluating the impacts of terrorism at micro-economic level, three main types of agents can be
identified: households (consumers), the private sector (producers) and the public sector. All three
agents can suffer both direct and indirect impacts: direct in the form of physical losses and other costs
associated with the attack and indirect in the form of a modification of their normal socio-economic
behaviour R[33].
2.2.3.1.
Household
There is little analysis of the impacts experienced at household level as a consequence of a terrorist
attack. Some studies focus on valuing the loss in life satisfaction and welfare that the household
experience due to the fear induced by an attack (or campaign) R[34]. These studies combine welfare
indicators, with terror indicators in order to analyse the effect of terrorism on life satisfaction. The
results show that terrorism has a significant negative effect on happiness and general life satisfaction.
This effect is materialized in the citizen’s willingness to pay for a potential reduction of terrorism.
Other psychological factors may play an important role in the economic behaviour of households. Fear,
insecurity, uncertainty about the future, and other factors may translate in a change of consumption
and investment patterns at micro-economic level which can have aggregated consequences.
The impacts are not always negative, Enders and Sandler R[6] showed that after the 9/11 attacks
consumer confidence experienced an increase, which is explained by the “patriotic” sentiment held by
a considerable part of the US citizens after the attacks.
Warning of a threat can also have consequences on the patterns of consumption and investment.
Households may be inclined to consume certain goods prior to an anticipated attack, in the same way
as when a natural disaster is forecasted. Also, in the wake of a big terrorist attack, the expectation of
future attacks may induce a similar response in the public.
- 26 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
2.2.3.2.
1.0
Private sector
Private businesses and firms have been both direct and indirect victims of terrorist attacks.
Globalization has made formerly immune companies become potential targets as their operations are
expanded into areas affected by terrorism.
The direct effect on a particular company depends on the characteristics of the attack, which may result
in the loss of property, the payment of ransom for hostages or any other form of damage. However,
some studies R[35] conclude that even if some sectors face significant losses due to terrorism, they are
likely to recover quickly if the economy does not face sustained attacks.
While direct physical losses may be important, other indirect impacts may have an effect on the
performance of the private sector. Changes in the perceived market risk, credit or operational risk may
have a severe negative impact even if companies are not directly affected by the terrorist attack. In this
context, supply chain interruptions have been studied extensively, for example, it has been estimated
that business interruptions accounted for one third of the entire losses of the 9/11 terrorist attacks.
Companies affected by supply chain disruptions underperform their competitors not only in operating
performance but on stock performance as well.
Therefore, it is not only direct impacts which affect the performance of companies in the private sector
but also indirect shocks that modify risk perception and expectations. This is evidenced by the target
chosen for the 9/11 attacks, which had economic importance and caused immediate indirect effects in
the world economy. Other targets of political or symbolic importance are less likely to cause deep
distortions in the economy, and the effects may be only local.
As stated above, the private sector is not immune to the psychological effects of a terrorist attack. Both
managers and employees are under the influence of their own psychological reactions to the terrorist
events, and that can influence the way their decisions are made. These effects may imply the use of
resources to provide additional security measures, in order to reduce the anxiety and fear of the
employees. For example, some firms reported to the London Chamber of Commerce, that their main
expenditure with regards to the London attacks on July 2005 was to provide alternative means of
transport for their employees that were afraid to take the public transport system. Unfortunately there
are few empirical studies that investigate these effects.
2.2.3.3.
Public sector
Public sector policies both before and after a terrorist attack are fundamental to contain and reduce the
detrimental economic impacts of the attack and to speed up the recovery. Policies need to be focused
on preparedness for the attack and response.
Immediate response to attacks implies dealing mainly with emergency health issues, especially on
large scale attacks. The organization of the public health and disaster relief infrastructure is key in
order to minimize losses. This is specially the case for chemical, biological and nuclear (CBN) attacks,
where, even on a small-scale, can cause widespread confusion, fear, and psychological stress
reactions that may have long lasting effects on the affected public. Here, detection containment and
emergency health care play a very important role. Even though these types of attacks have occurred
sporadically, recent events show that terrorist groups may employ these techniques against the civilian
population due to the potentially high number of victims.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 27 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
The preparedness and immediate response to an attack have not been the subject of empirical
academic studies although they are key to PTOs and IMs. As it is an area of low interest for academics,
the costs associated have not been isolated and measured in the existing literature; and therefore, they
are difficult to estimate.
The immediate response and emergency action are only part of the impact on the public sector, dealing
fundamentally with direct losses. The public sector is also responsible for adopting adequate decisions
in order to restore confidence, and prevent the spread of panic and fear among the civilian population.
Even if proper measures are taken, the effects on the citizens and businesses can be detrimental to the
economy, as we have seen earlier. In order to mitigate the indirect effects in the population and
businesses, governments have to provide the right incentives in order to restore economic activity.
Policy measures such as tax cuts, distribution of rebates, stimulus packages and other security
spending can account for a significant part of the total cost of recovery after a terrorist attack. These
policies can become permanent if the attacks are part of a campaign.
2.2.4.
Indirect macroeconomic effect
There have been attempts to measure the effect on the economy of a sustained campaign of terrorist
attacks. Dotan Persitz R[36] estimates that Israel’s average potential real per-capita GDP in the third
quarter of 2003 in the absence of the “second Intifada” is 8.6% higher than the real per-capita GDP
actually measured. This means that the average Israeli citizen lost at least 12.2% of real income
relative to potential income during the first three years of the “second Intifada.”
Alberto Abadie and Javier Gardeazabal R[15] measure the impact that the terrorist campaign by ETA
has had on the Basque-Country’s economy. This campaign not only includes bombing-based terrorist
attacks, but also targeted assassinations and kidnappings. The authors show that the overall impact on
the economy has been negative. Furthermore, their study shows a 10% average gap between Basque
per capita GDP and the per capita GDP of a comparable synthetic region without terrorism, over the
period of two weeks.
2.2.4.1.
Impact on different sectors of the economy
Over the last few years, scholars have analysed the effects terrorist acts have on various sectors of the
economy.
Tourism
Tourists have become a frequent target of terrorist activities in recent years R[37]. Examples are the
Luxor massacre in 1997, with 58 dead foreign tourists, and the bombing of a disco in Bali in 2002,
costing the lives of almost 200 tourists. The rationale for these attacks indicates that individuals
planning their holidays are less likely to choose a destination with a higher threat of terrorist attacks.
Host countries providing tourism services are, therefore, negatively affected by terrorist attacks. Enders
and Sandler R[16] estimate that a typical terrorist act in Spain scares away over 140,000 tourists, when
all the monthly impacts are combined. They also quantify the present value of loss in tourism revenues
for some European countries. Austria, Italy and Greece lost $4538 billion, $1159 billion and $0,77
billion respectively between 1974 and 1988. For the same period, continental Europe as a whole lost
$16,145 billion due to terrorism. However it is worth mentioning that the estimated impact on the
tourism industry in a particular country can differ significantly due to the different structure of the
industry in each country and the different intensity of the terror campaigns around the world and over
- 28 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
time. On the other hand, decreased inflows of tourists in some countries can impact the development of
the industry in other alternative destinations as tourists change their travel plans.
Foreign and local investment
Terrorism can also influence the allocation decision of firms investing money in real foreign assets.
Terrorists can attack and damage foreign owned firms, and disrupt their activities. Enders and Sandler
R[17] perform an analysis focused on Spain and Greece. They conclude that in Spain, terrorism is
estimated to have reduced annual foreign direct investment inflow by 13.5% on average for the period
1975-1991. Greece has suffered two major terrorist organizations, the 17 November and the
Revolutionary Popular Struggle and the reduction of foreign direct investment was estimated to be, on
average, 11.9% annually.
Local investments can be compromised as well if the risk of attack is perceived to be substantial. For
example, investment in construction can be considered much riskier than others such as machinery, in
areas where political instability or terror attacks are common. Fielding R[19] investigates the impact of
political instability on the level and composition of Israeli investments during the intifada, factoring in
numbers of both Palestinian and Israeli victims of attacks and growth of Jewish settlements. The results
show a negative relationship between the number of victims and investment in both manufacturing and
equipment. Estimates show that if terror campaigns were to stop increases in investment in
construction, machinery and equipment would significantly increase.
Consumption and savings
Terrorist acts can affect the perception of the risks associated with savings and consumption of
different goods. Individuals can opt to find alternative ways to employ their capital, away from the
country at risk. Eckstein and Tsiddon R[18] , find that for the Israeli economy from 1950-2003, the
effect of terrorism on consumption has been negative.
Stock markets
The effects on the stock market of terror attacks depend of the intensity and the coverage of such
attacks. The reactions of the stock market to a large-scale attack can be substantial, but if the attack is
isolated, a recovery phase takes place a short while after the attack, as reported by Chen and Siems
R[21] for the 9/11 bombings. Given that stock prices reflect the expected future performance of a
company, a terrorist attack may be perceived as an increased risk factor for the expected performance
to materialize. However it is difficult to isolate the risk factor derived from the effect of terrorism from
other factors in play. Abadie and Gardeazabal have measured the effect of a cease-fire in a terrorist
campaign by ETA in Spain R[15], finding that Basque stocks (Basque country was the region affected
by terrorism) outperformed non-Basque stocks during the cease-fire and showed relatively inferior
performance when the cease-fire ended. Eldor and Melnick R[20] have studied the effects of terrorist
attacks on Israeli financial markets. Their findings show that suicide bombings have permanent effects
on the market, while other kinds of attacks do not. Therefore a campaign with continuous attacks, even
on a small scale, may create lasting negative effects.
Foreign trade
A terror campaign or series of attacks can have a detrimental effect on foreign trade. The insecurity
associated with doing business in the affected country and the security measures needed to prevent
further attacks can affect demand and increase the cost of transactions. Attempts to measure the effect
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 29 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
on international trade have been made by Nitsch and Schumacher R[22] finding that in general,
countries affected by terrorism are less likely to trade with each other.
Urban Economy
Cities are very attractive terrorist targets due to the concentration of population. Due to this fact, it may
be possible that terrorism is one aspect that is considered in people’s settling decisions and therefore
affect the growth of cities and the distribution of the population. Although the rationale for this effect is
correct, studies have yet to find any empirical links that establish a relationship between urbanization
and terrorist attacks, and therefore the effect can be disregarded.
2.3.
Scenarios
SECURESTATION deliverables D2.2 and D3.1 detail the central threats covered by the project. These
threats can be grouped in the following categories:
Attack with explosives
Criminal/Vandalism,
Arson and IID threats
Dispersion of toxic substances
Sabotage
Computer hacking or cyber attacks
Attacks with small arms
A classification of costs caused by the attack can be made in terms of time dimension: short vs. long
term. This classification helps to understand which costs instantly take place in the different scenarios
and which costs are present over a long period of time after the attacks.
Short term
Loss of life and injuries
Includes compensation paid as a result of fatalities. Includes costs of
short term hospitalization, on-site first medical response
Damaged property
Damage to physical assets, infrastructure, rolling stock, other
equipment. Includes the cost of repair and/or replacement of such
assets.
Clearing / isolation of
affected area
Includes the cost of clearing, and cordoning off the affected area, and
providing information to the public. It also includes the cost of cleaningup afterwards.
Loss of business to the
operator
Cost of lost business during the period of service disruption to the
operator, compensations to be paid to passengers and cost of
alternative means of transport. It also includes the extra cost of
alternative routing through the network during the period of disruption.
- 30 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Loss of revenue to businesses located in the premises.
Loss of revenue to other businesses as a result of the attack: employees
delayed or not able to travel, fear and insecurity. Cost of goods
Economic impact of service
destroyed or locked. Extra costs of congestion to other network
disruption to other
operators (goods and passengers). Decrease in productivity as a result
operators and general
of fear or insecurity. The effects on the stock market are not taken into
public.
account as they are normally followed by a recovery phase that
neutralizes them R[21].
Long Term
Long-term injuries
Compensation paid to long-term-injury victims
Other compensations and
pensions
Legal fees and cost of litigations related to the attack. Extra cost of
insurance premiums as a result of the attack.
Long term reconstruction
costs
Costs of rebuilding heavily damaged infrastructures.
Operator loss of income
due to operator’s image,
fear, etc.
Loss of revenue as a result of a deterioration of the operator’s image or
fear of using public transport. Cost of incentives (discounts, promotions,
advertising, etc.) to stimulate demand.
Economic impact to other
operators and general
public
Long term economic impact due to changes in the behaviour in the
public, changes in consumption and saving patterns, changes in risk
perception, etc.
New security measures
Cost of new safeguards to be put in place in order to prevent future
attacks.
2.3.1.
Attack with explosives
Attack using explosives includes the following scenarios - IED, PBIED and VBIED.
Improvised Explosive Device (IED) with deferred or remote operating mechanism.
Improvised explosive devices, particularly relatively small ones, can be easily carried and
disguised. Normally, they are planted in advance by the attacker in a location where they are
least likely to be detected, but with high chances of causing considerable damage when the
device is detonated. The Madrid train bombings in 2004 followed this pattern; explosives were
planted inside the trains and were detonated remotely.
Personal IEDs, carried by the attacker. These explosive devices are carried by a person, a
suicide bomber, and are disguised in such a way that it doesn’t cause suspicion. The attacker
places himself in an area where the physical damage will be high, normally a crowded place,
and detonates the device there. Examples of this type of attack can be found in Israel during the
Intifada period.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 31 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Vehicle Borne Improvised Explosive Device (VBIED). This type of attack implies the use of a
vehicle operated by a suicide bomber or remotely controlled. The vehicle can also be planted,
such as the bombings in Madrid-Barajas airport in 2006. An operated vehicle can be detonated
on the move and close to a target area where the damage can be extensive.
The main economic consequences derived from this type of attack are direct. It is expected that
depending on the magnitude of the detonation, the level of harm to passengers can be substantial.
Many fatalities and injuries are normally the outcome of a bomb blast, be it mounted on a vehicle,
detonated by a suicide bomber or planted and operated remotely. The damage to infrastructure and
property is also expected to be significant. Depending on the origin of the blast, rolling stock and
infrastructure may be affected. In that case, the loss of business for the operator may be higher than if
the blast was located elsewhere. Severe damage in the infrastructure can render the station inoperable
for a long period of time and therefore the economic indirect consequences may be considerable.
2.3.2.
Arson and IID
This type of attack does not employ the same sophisticated means as other types, however the
damage inflicted can be substantial. Normally these kinds of assaults are carried out with the help of
some home-made device such as Molotov cocktail, or other IID. Attacks carried out in crowded areas,
or enclosed zones, can cause severe damage as the result of fire and smoke.
Generally these attacks are intended to attract the attention of the public towards the attackers cause,
and not to harm or kill people. Examples of these attacks usually take place during demonstrations in
open areas, such as streets and squares, and not so frequently in stations.
Usually, this type of attack does not carry severe economic consequences as their intent is not to
cause severe damage but to draw the general public’s attention towards a cause. However, if the
attack manages to cause a severe fire in a station, the consequences can be catastrophic. Smoke
inhalation can be the main source of fatalities due to the toxicity of its components. Fire can also have
an impact on the structure of the building causing it to collapse and multiply the damage in terms of
human fatalities and injuries and property damage. As in the case of an attack with explosives, service
disruption will depend on the location of the source of the fire and whether or not rolling stock and
infrastructure are affected. In order to minimize the adverse consequences, it is essential to detect the
origin of the fire as soon as possible.
2.3.3.
Criminal / Vandalism
Regular crime and vandalism acts do not normally imply loss of life, only cases of extreme violence can
cause some fatalities, but such extreme cases are very rare.
Vandalism normally causes minor or moderate economic losses and targets structures or rolling stock,
not people. These actions can stem from anger or envy or hate towards the target or society. Examples
of vandalism include breaking windows, spraying paint on walls and other elements, placing glue into
locks, etc. Vandalism could potentially cause service disruptions if vital components of the service are
targeted, for example, control rooms.
By criminal actions it is understood theft, pickpocketing and other forms of larceny. Violence may be
used when committing criminal acts but normally, the victim takes minor injuries.
- 32 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
2.3.4.
1.0
Dispersion of toxic substances
These kinds of attacks aim at dispersing poisonous substances with the intention of killing people.
Poisonous substances can be delivered through ventilation systems in buildings, dispersed with the aid
of explosive devices or merely released into the air R[38, 39].
Possible attacks include R[39]:
Chemical attacks
o Nerve agents (SARIN, VX)
o Blood agents (hydrogen cyanide)
o Choking agent (chlorine)
o Blistering agents (mustard gas)
Biological attacks
o Poison (ricin, botulin toxin)
o Viruses (smallpox, viral haemorrhagic fevers, flu)
o Bacteria (anthrax)
Radiological attacks
o Radiological dispersal device (dirty bomb)
o The spread of radioactive contaminants without a bomb or device
o Poisoning of food or beverages with radioactive isotopes
Toxic materials are normally easier to obtain or synthesize and are used more frequently than
biological ones (viruses, bacteria, etc.) and therefore are more likely to be used.
An example of this type of strike can be found in the 1995 Sarin gas attack on the Tokyo subway that
caused 12 deaths R[40].
The main economic consequences of these strikes are derived from the human fatalities and injuries.
As the attacks do not harm property, or infrastructure, disruption of service is normally lower than in
other kinds of strikes. Short term costs will include compensation cost and hospitalization of victims,
evacuation and cordoning and decontamination of the affected area. Long term consequences will
depend on the toxic substance released, and whether or not the exposure can carry long term effects
on health.
2.3.5.
Sabotage
This scenario contemplates the use of infrastructure systems such as signalling, telecoms, etc. by an
attacker in order to cause service interruption and damage. It includes physical access to systems in
order to modify their normal behaviour and cause malfunction of the service.
The economic consequences of this type of attack can vary depending on whether or not critical
systems are compromised. Signalling failure can cause accidents with people injured and even
fatalities, whereas the malfunction of other non-critical systems can cause service disruption but no
other consequences.
As an example, a sabotage attack took place in Bristol, UK in 2012. Signalling cables in the rail network
were destroyed causing severe delays and cancellation of services. There were no injuries or mortal
victims caused by this attack.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 33 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
2.3.6.
1.0
Computer hacking or cyber-attacks
Computer security vulnerabilities may expose critical infrastructure control systems to malicious
operators. Attackers may gain access to such systems and modify their behaviour or render them
useless. This may cause failure in critical systems or service disruption. Service interruption caused by
a cyber-attack can be long if no business continuity plans exist.
As it happens with the sabotage scenario, the economic consequences of such an attack may vary
depending on which systems are targeted. Damage can be caused by rendering IT systems useless,
for example with a DoS (Denial of Service) attack, or virus-based attack. If the system is critical, there
is a high probability of a service disruption or even an accident. If the system is not critical, such as
online ticket reservation, there will be some alteration of normal operations but no severe economic
harm.
An example of a cyber-attack can be found in 1999 where NATO computers were targeted. Machines
were blasted with e-mail bombs and hit with DoS attacks by so called “hacktivists”. The main purpose
of this attack was to protest and draw media attention to their cause. The effect was not severe
although it caused service disruption.
2.3.7.
Attacks with small arms
This scenario is characterized by the use of firearms, grenades and other small arms against targets.
Attacks are carried out in busy areas where the number of fatalities can be large. When combined with
explosives this type of strike can cause significant damage. An example can be found in the 2008
Mumbai attacks where twelve coordinated shooting and bombing strikes were carried out across
Mumbai, killing 164 people and wounding at least 308.
Unless explosives are used, the main damage caused by these types of attacks is derived from dead
and injured victims. Depending on the number of attackers and their ability with weapons, the
consequences in terms of number of fatalities can be devastating. If the attack uses explosive weapons
like grenades, or other types of IEDs, it is expected that some damage will be caused to the station
infrastructure, and depending on the location of the blast, rolling stock can also be affected. If that is
the case, the service interruption can be severe and therefore cause losses to both operator and
customers.
2.3.8.
Summary of scenarios
The table below shows a summary of potential costs that can be caused depending on the type of
attack. Some scenarios present a high potential of causing severe costs in economic terms, although
as stated earlier, that will depend on the circumstances and characteristics of the attack. For example,
an attack based on time-deferred explosives has a high potential of producing great economic costs in
terms of fatalities and injured victims and damaged property and infrastructure. However, if the
explosive device is located in an area where there is no critical infrastructure and low concentration of
people, the resulting consequences can be lower than in an attack with small arms. Therefore, the
table represents the potential for causing losses.
The colours in the table represent the potential for causing losses and also the scale of these losses in
monetary terms, from tens of thousands of Euros to hundreds of thousands of Euros.
- 34 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
Very High
Hundreds of millions
High
Tens of millions
Medium
Millions
Low
Hundreds of thousands
Very Low
Tens of thousands
1.0
New security measures
Economic impact to other
operators and general public
Operator loss of income due to
operator’s image, fear, etc.
Long term reconstruction costs
Other compensations and
pensions
Long term injuries
Economic impact of service
disruption to other operators and
general public
Long term
costs
Loss of business to the operator
Clearing / Isolation of affected
area
Damaged property
SCENARIO
Loss of life and injuries
Short term
costs
Explosives
Arson and IID
Criminal /
Vandalism
Dispersion of
toxic substances
Sabotage
Computer
hacking or
cyberattacks
Attack with small
arms
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 35 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
3.
Methodology
3.1.
Methodology
3.1.1.
Qualitative and quantitative approach
In a socio economic approach, normally two levels of analysis must be considered. The first is the
matter and the second is the audience. Benefits and costs of many programs are not easy to measure
and different stakeholders are interested in different benefits and costs. Consequently, benefits and
costs cannot be expressed only in monetary terms
Socio economic analysis can go through two approaches: a formal cost benefit analysis or a socio
economic assessment. A cost –benefit analysis is based on a monetary evaluation of the proposed
initiative. All costs and benefits must be translated into a common measure and at a common point of
evaluation (through the net present value calculation).
A standard economic approach to policy design is to evaluate the costs and benefits of various policy
options (projects). In order to make sense, a project’s benefit should exceed its costs and when
choosing between different alternatives, ranking alternatives according to their net benefits helps inform
policy decisions.
The methodology will focus on:
Analysis of different baseline scenarios;
Analysis of the cost resulting from the implementation of security measures with respect to the
baseline scenarios both in technology or process-related solution
Evaluation of the risk reduction (previous risk versus residual risk)
Cost comparison: reduction in risk/consequences of the attack versus the costs of implementing
security measures.
3.1.2.
Risk assessment methodology
SECURESTATION Deliverable 3.2 R[1] contains the risk assessment methodology used to evaluate
risks and their consequences. As detailed in the methodology, a typical security risk assessment
includes the following four key steps:
(1) Risk and safeguards identification;
(2) Risk analysis;
(3) Risk reduction and assessment;
(4) Cost-benefit and feasibility analysis.
The risk analysis phase evaluates the probability of a threat materializing, and then the consequences
of that threat are evaluated and converted to a common monetary denominator. On the third step, a
risk reduction assessment is performed based on the inclusion of specific safeguards. The fourth step,
consists of a cost benefit analysis, that will take into account the risk reductions achieved by the
- 36 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
safeguards, and the consequences of the attack, together with the cost of implementing such
safeguards.
3.1.3.
Risk mitigation and management
SECURESTATION Deliverable 3.2 R[1] shows that quantification of the risk is based on the likelihood
of attack, system vulnerability and the consequence of the attack. Comparing different risks of an
attack before and after the inclusion of safeguards, Risk 1 (r1) is greater than Risk 2 (r2) if the product
of the factors (likelihood, vulnerability and consequence) of Risk 1 are greater than those of Risk 2, i.e.,
r1>r2.
Likelihood of
adversary attack (1)
X
Likelihood that the
adversary succeeds (2)
X
Consequences of
the attack (3)
=
Risk
Where
(1) the probability that an adversary will perpetrate an attack (specific asset and tactic, for example:
shooting at a passenger train);
(2) the probability that the attack will succeed, from the adversary's perspective; and
(3) its potential results in economic terms.
The mitigation of risk can imply a reduction of the consequences and/or a reduction of the probability of
a successful attack both in terms of likelihood of the attack (PA) and likelihood of success (1-PE), as it is
shown in Figure 1 and Figure 2:
Figure 1. Risk reduction from r1 to t2 (two-dimensional view)
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 37 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Figure 2. Risk reduction from r1 to t2 (three-dimensional view)
3.1.4.
Consequences evaluation
Consequences of the attack are assessed in terms of costs. A summary of costs associated with the
consequences of an attack is shown below. Costs are categorized in two groups: direct and indirect, as
described in section 2.2.1
Direct costs
D1.
D2.
D3.
D4.
D5.
D6.
D7.
D8.
D9.
D10.
D11.
Loss of life and Injuries
Damaged physical assets and infrastructures
First response costs
Hospitalization costs
Clearing / Isolation of affected area
Loss of revenue due to service interruption PTO/IM
Compensations to passengers PTO/IM
Loss of revenue (other PTOs/IMs)
Loss of revenue (other businesses)
Costs of diverted transportation services
Economic loss due to transport service unavailability (supply chain and passengers)
Indirect costs
I1.
I2.
I3.
I4.
I5.
- 38 -
Loss of income to PTO/IM due to fear, anxiety, brand image, etc.
Loss of income to other PTOs/IMs due to fear, anxiety, brand image, etc.
Insurance costs (increased premiums, extended insurance, etc.)
General impact on economy (GDP, trade, tourism, investment, etc.)
New security measures put in place
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Some of these costs can be obtained directly from the simulation of each scenario; however, other
costs must be described in a qualitative way as it is difficult to infer whether or not there would be an
impact. For example, it is difficult to know the effect of fear and insecurity and whether that has an
impact on PTO/IM income and the general economy; the effect will be different if the attack is isolated
or part of a campaign of attacks. Moreover, costs related to congestion in other transport networks, or
loss of revenue to other businesses will depend on the structure of the transport network, and therefore
can be difficult to estimate. It is important to recognise that the costs arising from an attack are
distributed between different entities (e.g, IM, PTO, member state, private sector, insurance companies
etc.). This enables benchmarking of costs that can be measured and which are directly associated to
the railway sector.
3.1.5.
Costs of implementing security measures
Security measures aim at reducing the likelihood of a successful attack taking place or at minimizing
the consequences of an attack. There is a wide range of measures to be put in place according to the
different types of attacks. Safeguards range from detection systems (such as smoke or toxic materials)
to the procedure of physical and baggage checks.
The costs of implementing such measures can be categorized in two groups: direct and indirect. Direct
costs represent the expenditure being made in order to implement the security measures, such as
installation costs, staff, maintenance, etc. Indirect costs include the effect that such measures have on
the PTO/IM business. These indirect costs include extra delays in passenger flows, loss of income as a
result of increased hassle for passengers due to the implementation of security measures (random
checks, dogs, surveillance cameras, etc.), loss of income due to the modification of the station
premises in order to accommodate safeguards (fences, walls, etc.).
As it occurs with the evaluation of consequences, direct costs can be easily calculated while indirect
costs are difficult to estimate and have to be described qualitatively.
3.1.6.
Cost efficiency calculation
As we have seen, each scenario will provide two different risks evaluations:
(1) Baseline, where the security measures have not been implemented – represented by R1
(2) After the implementation of safeguards – represented by R2
It is expected that the implementation of safeguards will reduce the initial risk (R1), either by reducing
the consequences of the attack (for example, by strengthening the station infrastructure), by reducing
the likelihood of an attack and/or decreasing the probability that the attack will be successful
(decreasing the target’s vulnerability).
It is important to note that the cost-efficiency evaluation will be used on a single case basis, given that
the security measure analysed will be implemented to protect the target against a particular tactic or
type of attack.
Therefore, in the baseline scenario (where the security measures have not been implemented) the risk
is defined by:
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 39 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Where,
PA1 – is the probability that the attack will take place during a certain period of time
V1 – is the vulnerability, the probability that the attack will be successful
PI1 – is the probability that the attack will be deterred
C1 – represents the consequences of a successful attack in monetary terms.
R1 – represents the risk associated with the scenario prior to the implementation of safeguards.
And after the implementation of security measures the residual risk is defined by:
Where,
PA2 – is the probability that the attack will take place during a certain period of time, after the
implementation of safeguards.
V2 – is the vulnerability, the probability that the attack will be successful
PI2 – is the probability that the attack will be prevented after the implementation of safeguards.
C2 – represents the consequences of a successful attack after the implementation of
safeguards in monetary terms
R2 – represents the risk associated with the scenario after the implementation of safeguards.
Since PA1, PI1, PA2 and PI2 are non-dimensional probabilities, risks are expressed in monetary terms.
As it’s indicated before, it is expected that the implementation of security measures will lead to:
A reduction of the consequences of the attack, so that C2 < C1, or
A reduction of the probability that the attack will take place PA2 < PA1, or
A higher probability of preventing the attack PI2 > PI1.
Therefore, the implementation of security measures will have an impact by reducing the total risk, R2 <
R1.
In order to assess whether the safeguards are cost-efficient, the risk reduction during a certain time
interval has to be compared against the cost of implementing and maintaining such measures during
the same time interval.
- 40 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
The difference between both risks represents the mitigation effect of the security measures put in
place.
The risk reduction effect has to be compared with the cost of implementing and maintaining the security
measures: Q.
The cost-benefit evaluation is performed as follows:
Thus, the mitigation effect of the security measures has to be greater or equal than the cost of
implementing such measures in order to be cost-efficient.
In order to simplify, risks can be defined as:
Where Πi is the probability that the attack will take place and be successful, that is
Thus, the risk reduction effect of the implementation of the security measure implemented can be
defined by:
As it is defined in 3.1.3, any security measure can modify the probability of attack, the vulnerability (the
probability that the attack will be successful), and the consequences of the attack. Therefore, both the
probability of a successful attack and the consequences of the attack after the security measure has
been implemented can be expressed in terms of the probability and consequences before its
implementation.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 41 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Thus:
Where
ρm is the probability reduction factor of the security measure
φm is the consequences reduction factor of the security measure
Therefore, the total risk reduction factor achieved by the implementation of the security measure RRm,
can be expressed as
Both ρm and φm are dependent on the particular security measure implemented and their values
range from 0 to 1, since it is expected that the security measure will reduce either the probability of
attack, the vulnerability (probability that the attack will be successful) and/or the consequences of the
attack.
For the purposes of the cost benefit evaluation, the higher the reduction factor it is, the more costeffective the security measure will be, since it reduces in a larger scale either the probability of
successful attack, the consequences or both.
For example, a CCTV and video analytics system can reduce both the probability an IED attack and
the target’s vulnerability by detecting suspicious behaviour and objects. However consequences are
more difficult to reduce by the use of the video surveillance system, unless the station is evacuated
before the device is detonated. Therefore, it can be assumed that the system only modifies the
probability of a successful attack (probability of an attack together with vulnerability) by reducing it to a
half of what it was before, it will have a ρm of 0.5 and φm of 1.
3.1.7.
The value of time
In most projects which require an investment, the costs and benefits are spread out over time. Since
people are not indifferent with respect to the timing of costs and benefits, it is necessary to calculate
the present value of all costs and benefits. It is therefore important that the valuation of costs and
benefits takes into account the time at which they occur, since it is generally preferred to receive
benefits as early as possible and pay for costs as late as possible.
- 42 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
The standard approach to valuing costs and benefits that occur at different times is based on the fact
that a monetary unit today is worth more than a monetary unit tomorrow. The approach reduces a time
stream of costs or benefits to an equivalent amount in the price year’s monetary units. This amount is
known as the present value (PV) of the future costs and benefits.
In the case of the evaluation economic impact of a security measure, the present value is calculated
using the method of compound interest and the rate that converts future values into present value
monetary units. The present value of costs and benefits can be expressed as follows:
Where:
Qn = Costs in year n, both capital expenditure and operation expenditure, expressed in
constant monetary units
RRmn = Risk reduction effect of security measure “m” in year n expressed in constant monetary
units. Mitigation effect is assumed to be equal during the whole lifespan of the security
measure.
r = real discount rate
n = evaluation period in years, lifespan of the security measure.
Thus, the net present value (NPV) of a security measure can be expressed as the following formula:
The discount rate is used to convert costs and benefits that occur in different time periods to present
value so that they can be compared. It is based on the principle that, generally, society prefers to
receive goods and services now, rather than later, and to defer costs to the future. The selection of the
discount rate has an impact on the magnitude of the reported results.
The generally preferred approach is to use a real discount rate, that is, to exclude any inflationary
component of market rates. Inflation must be treated consistently across both the applied discount rate
and the costs and benefits components of the evaluation. However, it is noted that if costs and benefits
are measured in nominal (or current) monetary units, then a nominal discount rate should be used. For
the purposes of this study, a nominal discount rate will be used.
The present value of costs and benefits are measured over a set evaluation period. In this case, the
evaluation period will depend on the economic life of the security measure to be used. The economic
life of a security safeguard is the period of time over which the benefits to be gained from the project
may reasonably be expected to accrue. The key issue is to ensure that the period chosen is sufficiently
long enough to ‘capture’ all potential costs and benefits of the project.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 43 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
4.
1.0
Cost Benefit Analysis of threat scenarios
In order to illustrate a cost benefit analysis focused on a particular security measure implementation, a
series of scenarios will be simulated, calculating the possible costs and benefits. This analysis will be
performed from the point of view of a public transport operator or infrastructure manager that is facing
the decision of whether or not to implement a particular security measure.
The scenarios are intended to be a reference for a cost-benefit analysis of a determined security
measure. However, as the scenarios are based on a reference model of a station, both costs and
benefits will be dependent on the station itself and would not be applicable to other stations.
Nevertheless, the methodology used, can be applied to other stations by altering some parameters
such as the cost of implementation of the security measure analysed or the probability of a successful
attack.
As both costs and benefits in economic terms can vary from country to country, there is some degree of
adjustment that would have to be made. As stated before, these costs refer to a “reference station”,
and the station should be in an “average” European country.
In addition, stations are not usually managed individually, but as part of a network. A particular public
transport operator may manage several stations in the same city, region or country. This implies that
both costs and benefits are evaluated not on a station by station basis but at a global network level.
This calculation depends on the size of the operator’s network, the structure of the network and the
relationships with other operators. Nevertheless, it is necessary to establish a framework of how costbenefit evaluations can be carried out. Therefore, in order to simplify the evaluation and focus on the
relevant factors, a single station will be considered.
In the analysis, the station model developed for other SECURESTATION Work packages will be used,
in order to keep consistency with the simulations of different attacks performed in other Work Packages
in SECURESTATION.
Finally, a sensitivity analysis is carried out for each scenario in order to analyse the cost-efficiency of a
security measure depending on the probability of a successful attack and the economic value of the
consequences of the attack.
4.1.
Costs considered
Costs of implementing and operating a particular security measure are spread across the total lifetime
of the measure, from first installation until retirement or replacement. The total cost of ownership will
include not only costs related with the implementation of the security measure but also the operation,
training, maintenance etc. In order to reflect these costs in a time frame, the total cost will be divided in
two: capital expenditure and operational expenditure.
4.1.1.
Capital expenditure or CAPEX
Capital expenditure or CAPEX is defined as the amount spent to acquire assets or improve the useful
life of existing assets in an organization. Normally, it is expected that capital expenditures will produce
future benefits.
- 44 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
In the case of security measures, the total capital expenditure taken into account comprises:
Retail costs
Installation costs
Initial training of personnel
Software licences
Other licenses, permissions or taxes needed to operate the security measure
Capital expenditure can be financed through several methods, though for the purpose of this analysis it
is assumed that the expenditure takes place in time 0, that is, just before the measure is operative.
4.1.2.
Operational expenditure or OPEX
Operational expenditure or OPEX is defined as the expenditure that an organization incurs when
performing its normal business operations. In the case of security measures, it is the expenditure
associated with the operation of that particular measure. Therefore the following costs will be taken into
account:
Maintenance costs
Salaries of personnel associated with the operation of the security measure
Software Licenses (recurring payments)
Service fees
Operational expenditure is assumed to be paid annually and to be a fixed amount for the lifetime of the
security measure. Therefore, average calculations will have to be performed where expenses vary with
time.
4.2.
4.2.1.
Benefits considered
Consequences
As it is explained in section 3.1, benefits are expected to be derived by a reduction of risk that can be
achieved either by a reduction of the probability of a successful attack, by a mitigation of the
consequences (in economic terms) of the attack or both.
Therefore it is necessary to perform an evaluation of the consequences, in order to have an estimation
of the benefits that the security measure will provide.
The consequences to be accounted are:
Fatalities and injuries
Damages to assets, infrastructure and reconstruction costs
Income lost as a result of service interruption
Costs of alternative means of transportation provided to passengers.
Income lost as a result of fear, anxiety, brand image degradation, etc.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 45 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Consequences not accounted are displayed in the following table together with the reasons why they
are not taken into account:
Consequence
Reason why it is not included in the calculation
Clearing / isolation of affected area
These costs are usually borne by the local, regional or national
authorities and are transparent to the operator.
Economic impact of service
disruption to other operators and
general public.
Even though these costs can be significant in the aftermath of
an attack, they are borne by the other operators and society in
general. The effects on the operator’s income is estimated in
section 4.2.6
Compensation due to long-term
injuries, and fatalities
Other compensations and
pensions, insurance premiums, etc.
Economic impact to other
operators and general public
New security measures
These costs are usually borne by national authorities.
These costs are difficult to estimate and depend not only on
the type of the attack but also on the national regulation and
the operator’s obligations. In some cases, no other insurance
premiums or extra costs arise from an attack, in others, such
costs can be significant.
These costs are not borne by the operator.
Even though the installation of additional security measures as
a response to an attack can be attributed to the attack itself, it
is highly dependent on the operator’s management team and
the conditions and context in which the attack takes place.
Table 2 Consequences not taken into account in CBA analysis
4.2.2.
Fatalities and injuries
Generally, costs derived from fatalities and injuries are not directly borne by the station operator,
although there may be some costs implied in insurance premiums. For the purposes of this analysis,
these costs will be taken into account as they are of great importance and the main reason to
implement the security measure in particular.
The HEATCO Project R[29] provides data that can be used as a reference, as it is shown in section
2.2.2.1. However, in order to consolidate a single figure for each value (fatality, serious injury, and light
injury) an average of the different values for the European countries has been made.
- 46 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Euro values in Table 1, have been adjusted to 2012 Euros considering the Eurozone inflation, and a
weighted average has been performed taking into account the country’s population. The results can be
found in Table 3.
VSL values (fatalities and injuries)
Weighted Average by population
Fatality
1,785,000 €
Severe injury
Slight injury
240,000 €
19,000 €
Table 3 VSL values (fatalities and injuries)
4.2.2.1.
Standing crowd density
In order to evaluate the number of victims of a particular attack, it is essential to know the average
number of people present in the station at the time of the attack. Usually, the effect of an attack
(explosion, PIH dispersion, etc.) is described as an area affected by the attack. Depending on the
number of people present in that area the number of fatalities will vary.
In the particular environment of the station, the density of people varies with the time of the day,
existing peak density phases associated with rush hour periods and other with low density phases
when the station is not so busy. It will be assumed that there is also a variation of the density of people
associated with the different areas of the station. In the cafeteria area or in the platforms area, for
instance, the crowd density will be higher than in other areas such as corridors.
A visual representation of crowd density can be seen in Figure 3, Figure 4 and Figure 5:
Figure 3. Standing crowd density of 0.5 people per square meter
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 47 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Figure 4. Standing crowd density of 1 person per square meter
Figure 5. Standing crowd density of 2 people per square meter
For the purposes of this study and for the different areas considered the following people densities will
be applied.
- 48 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Cafeteria
High density
period
0.5 p/m2
Average density
period
0.3 p/m2
Low density
period
0.1 p/m2
Platform
Commercial area and corridors
0.7 p/m2
0.3 p/m2
0.3 p/m2
0.2 p/m2
0.1 p/m2
0.1 p/m2
Table 4 People densities used in the study
4.2.3.
Damages to assets, infrastructure, and reconstruction costs
When an attack occurs part of the building and some of the fixed assets in the station are expected to
be damaged.
For the purposes of this study, an estimation of the damages borne by the station building and
infrastructure will be carried out, based on publications of data regarding reconstructions made after
similar attacks. The amount estimated depends on the type of attack. While explosive devices and fire
can cause great damage R[31], PIH dispersion causes very little damage to the building and fixed
assets R[40].
4.2.4.
Income lost as a result of service disruption
From the time of the attack until the time of fully recovery, the station remains inoperative. During that
time, all essential functions are not carried out and therefore the income derived from them can be
accounted as losses derived from the attack.
For the purposes of this analysis this income will be calculated as two separate streams:
Income from sales
Income derived from other services: advertising, rent, etc.
The amount lost by ticket sales, passengers unable to use the station due to service unavailability, will
follow the following formula:
Where
Atp:
Average ticket price = €15
Appd:
Average number of departing passengers per day = 75,000
Nds:
Number of days of unavailability of service (not counting the day of the attack,
where an alternative bus service is provided, see section 4.2.5)
This equation leads to a daily income loss of around €1,125,000.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 49 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
The amount lost by other services will depend on how the station is designed, what is the number of
retail centres and real-state area available, the advertisement real-state and whether or not some of
these services are outsourced or managed by the station operator. Network Rail in the UK can be
taken as a reference R[41], where around 4% of its revenue comes from commercial rents and
advertisement. Therefore if we assume the average ticket price, number of passengers per day
indicated above, the daily income lost attributed to other services will be around €45,000.
The number of days that the commercial space is not available to be used may in most cases differ
from the number of days of lack of service, since all the assets related to the essential service are
usually given priority in the recovery phase.
Thus, the total lost income as a result of a service disruption will be:
Where
Nds: Number of days of unavailability of service (not counting the day of the attack, where an
alternative bus service is provided, see section 4.2.5)
Ndc: Number of days of unavailability commercial space.
4.2.5.
Costs of alternative means of transportation
In case of a service disruption, due to a terrorist attack or any other cause, passengers are unable to
reach their destination. Some of these passengers may have already purchased the corresponding
ticket and find that there is no service available to them. It is typically the case that the operator
provides all passengers with alternative means of transport, while the service is being restored.
Usually, a bus service is provided that covers the need of passengers to get to their destination. The
service is offered for free for customers that have purchased a ticket, and in some cases, to other
customers as well.
For the purposes of this analysis, the cost of a complimentary bus service provided to passengers is
taken into account. The service is provided on the day of the attack, reimbursing all other passengers
that may have already purchased a ticket for the subsequent days (this cost is accounted as loss of
income due to unavailability of service see section 4.2.4).
An average cost of renting a bus service with capacity for 55 passengers can be approximated to
around €700 per day (a trip would be completed in a day). Therefore, assuming all 75,000 passengers
would need to be transported to their destination, the total cost would come to around €950,000.
4.2.6.
Income lost due to fear, anxiety, brand image degradation, etc.
The effects of a terrorist attack go well beyond physical aspects causing changes in the behaviour of
the population, even among those not directly affected by the attack R[36].
The effect of fear, insecurity and anxiety could be translated to choosing other means of transport of
altering the schedules of travels. In the wake of a terrorist attack in a public transport facility, the public
- 50 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
normally chooses not to travel unless strictly necessary or turns to other means of transport that are
considered to be less risky. This change in behaviour can have a detrimental effect in the operator’s
income statement, causing a drop in passengers in the aftermath of the event and subsequent months
(besides the period of unavailability of service derived from the attack).
It is difficult to assess the length and the depth of this decrease in passengers, and it depends highly
on the type and severity of the attack, whether it is part of a campaign of attacks or an isolated attack,
the perpetrators of the attack, etc.
Studies from Abadie, and Gardeazabal R[15] show that the global effect of a terrorist campaign can
damage the global annual output of the economy of the region affected by around 10%. As an
approximation, for the purposes of this study, it is assumed that the impact in the operator’s income will
be the same, a -10% drop in annual sales, that is around 42M€.
4.3.
Discount rate
Discount rates used to evaluate different investment projects vary from country to country and from
company to company. The nature of the investment project may also modify the discount rate applied,
although usually the same discount rate is used to evaluate projects within an organization. The nature
of the organization, whether it is public or private may also lead to a different discount rate R[42].
In the transport sector very different discount rates are used, while in Mexico the discount rate used is
around 12% in France it is 3% R[11]. The higher the discount rate, the less value future monetary flows
will have in the present. Generally, in the European transport sector the rate used is between 3% and
6% R[11]. The discount rate to be chosen for this analysis is 4%.
4.4.
Results and sensitivity analysis
The results of the analysis of the different scenarios show whether the security measure implemented
is cost-efficient or not.
As it is shown in section 3.1.6 the risk reduction factor depends on the initial risk: the probability of an
attack and the consequences of the attack in monetary terms. Therefore, the cost-efficiency of a
particular security measure will not only depend on the capacity of the security measure to reduce the
probability of the attack or the consequences but also on the probability and consequences that the
attack has before the introduction of the countermeasure.
Given the difficulties of estimating the probability of an attack and its monetary consequences, it is
desirable to perform a sensitivity analysis. The sensitivity analysis can be based on two variables, the
probability of attack and the monetary consequences.
Thus, the probability of an attack and the consequences are represented in a matrix and the costefficiency of the security measure calculated for each of the combinations of probability and
consequences.
It is expected that for low probabilities and small economic consequences most security measures will
not be cost efficient, as the benefit they produce (risk reduction) will be small compared to the total cost
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 51 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
of ownership of the security measure. The level of risk for this combination, may be acceptable for the
organization, thus no measure should be taken to reduce it. But if the security measure is cost efficient
even under these circumstances, its implementation should be considered.
For high probabilities and large economic consequences, even if the security measure reduces either
the probability or the consequences by a small factor, it is likely that it will be much larger than the total
cost of ownership, making it cost-efficient. If a security measure is not cost efficient in these
circumstances, then its implementation should not be considered.
When the combination of consequences and probability does not fall in the extremes, the level of risk
may not be acceptable to the organization and it is advisable to take actions to reduce it. In this case is
useful to consider the cost-efficiency of the implementation of the security measure as it can be an
important factor in the decision making process.
- 52 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
4.5.
1.0
Scenario 1: IED in luggage left in the station’s cafeteria
4.5.1.
Scenario description
This scenario is based around the presence of an IED in the cafeteria area at level -1. This area is
located at the intersection of two corridors, the first corridor leads to the metro platform while the
second corridor leads to the train platform. In both corridors commercial areas are present.
The IED is an explosive charge of 15kg of Semtex. The explosive contains 5mm steel balls used as
shrapnel. This is the DBT for a worst case scenario.
The device is concealed in a rucksack or travel bag and planted in the cafeteria area, left there
unattended and detonated remotely.
The time of the attack coincides with a period of high density of in the morning rush hour.
4.5.2.
4.5.2.1.
Consequences
Fatalities and injuries
Figure 6 represents the different areas affected by the explosion. Considering the steel balls as
shrapnel, the area in which people will suffer serious injuries is enclosed within a radius of 32.2 m,
whereas in the area between 32.2 m and 39 m, and greater than 39 m, the shrapnel will cause
moderate injuries and slight injuries, respectively.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 53 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Figure 6. Scenario 1, IED planted in cafeteria, areas of damage
In order to assess the number of victims the standing crowd density of the area must be considered. As
the attack occurs during a period of high density of people, the considered density in the cafeteria area
is 0.5 p/m2 and 0.3 p/m2 in the commercial area and corridors, so an average of 0.4 can be considered
for the whole area. The area corresponding to the parking zone will not be considered as is has walls
and doors blocking the effects of the blast.
The area most affected by the blast in which fatalities will occur, corresponds to a 32m-radius circle,
which represents an area of around 3,217 m2. The area that relates to severe injuries corresponds to a
7m width ring adjacent to the 32m-radius circle which represents an area of 1,561 m2. Similarly, the
area where light injuries occur corresponds to a 61m-width ring adjacent to the severe injuries area,
which represents an area of 26,637 m2. However, a significant part of these areas, corresponds to
zones outside the building or spaces behind walls and doors, and cannot be considered in the
calculations.
- 54 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Therefore, considering the people densities above, and the areas affected, the approximate number of
fatalities and injuries will be:
Fatalities
200
Severe Injuries
Light Injuries
127
190
Table 5. Scenario 1: Number of fatalities and injuries
Considering the values of Table 3, the consequences in monetary terms are:
Fatalities
357,000,000 €
Severe Injuries
Light Injuries
TOTAL
30,480,000 €
3,610,000 €
391,090,000 €
Table 6. Scenario 1: Consequences of fatalities and injuries
4.5.2.2.
Assets, infrastructure and reconstruction costs
Considering the effects of such a blast, a number of systems will be affected; however no major
structural reconstruction will have to be made. Similar reconstructions took place in Spain after the
March 11th attacks in 2004 R[31].
In order to assess the costs of reconstruction a reference can be taken from the average construction
costs of developing public buildings. The Turner & Townsend survey R[43] assesses the average rates
of developing different types of property in different countries. Prices vary from commercial property to
residential property, office buildings, airport, etc. Table 7 shows the 2012 prices of different property
types.
Commercial Building
929 € per m2
Germany
Ireland
United Kingdom
Average
Airport terminal
1,125 € per m2
2,550 € per m2
3,500 € per m2
2,728 € per m2
3,791 € per m2
2,805 € per m2
2,069 € per m2
Table 7. Average construction rates in 2012
As the train station will have commercial areas and most of the characteristics of an airport terminal, an
average between the two rates would be reasonable to use as the rate for the reference station, that is
a cost of around 2,400 € per square meter.
Thus, assuming that most of the -1 level is destroyed and some of the surrounding spaces, a total area
of around 15,000 m2 would correspond to a total cost of around 36 M€
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 55 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
4.5.2.3.
1.0
Income lost as a result of service disruption
The attack in the cafeteria area, does not affect critical service infrastructures necessary to provide
service. Therefore it is expected that under such attack, the amount of time necessary to recover the
service will be around one or two days. Assuming a worst case scenario of 2 days without service, and
using the data in section 4.2.4, the total income lost will be around: 2,250,000 M€.
The number of days of unavailability of the commercial areas is different from the core transportation
service. As the explosive is detonated in an area surrounded by commercial space, it is expected that
the reconstruction time to recover functional service can be longer. Reconstruction time to achieve full
operation could take between 30 to 45 days. Assuming the worst case scenario and using the data in
section 4.2.4. the total income lost is around 2.025 M€.
Therefore, total income lost as a result of service disruption would be around: 4.275 M€
4.5.2.4.
Costs of alternative means of transport
As indicated in section 4.2.5, it is considered that complimentary service will be provided on the day of
the attack. The following days of service unavailability will be considered in the section 4.5.2.3.
Therefore, considering the assumptions in section 4.2.5, the cost of alternative transport will be around
€950,000.
4.5.2.5.
Income lost due to fear, anxiety, brand image degradation, etc.
The assumptions described in section 4.2.6 indicate that an approximation to the income lost due to
psychological and perception factors will be around 10% of the total yearly income. For this particular
case, the income lost will be around 42 M€.
4.5.2.6.
Sum of all consequences
Total costs described in previous sections are represented in the following table:
Fatalities and injuries
391,090,000.00 €
82.5%
Asset damage and reconstruction
Income lost (service disruption)
Alternative means of transport
Income lost (fear, anxiety, etc.)
TOTAL
36,000,000.00 €
4,275,000.00 €
950,000.00 €
42,000,000.00 €
474,315,000.00 €
7.6%
0.9%
0.2%
8.9%
100.0%
Table 8. Scenario 1. Sum of all consequences
As expected, for this kind of attack, the main part of the total consequences corresponds to Fatalities
and injuries (82.5%), therefore, the cost-benefit analysis will highly depend on this factor. As indicated
in section 4.2.2, these costs are usually not directly borne by the public transport operator, however, as
the main purpose of the security measure is to reduce this effect, they are considered for the analysis.
- 56 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
4.5.3.
1.0
Security measure evaluated
4.5.3.1.
Description
The countermeasure analysed is a wireless IP video surveillance and analytics system. As indicated in
section 3.1.6 the analysis will be carried out on an individual target-tactic pair base, that is, the system
is intended to protect the station against an IED attack.
Video surveillance systems give the user the ability to perform real-time monitoring of the environment,
people, and assets and providing recording for investigative purposes.
The system has the following components:
cameras,
cabling (power, video if wired system)
power adapters / power distribution block
video recording system (DVR)
monitors
Figure 7. Video monitoring and analytics system diagram
The system also comprises a video analytics subsystem that is used to detect threats based on an
analysis of video feeds coming from the cameras. These systems use video analysis algorithms to
detect different events based on the user configuration. Usually these systems have the following
capabilities:
Tripwire: Identifies user-defined objects that move in a specified direction as they cross over a
line (tripwire) drawn within the camera's field of view.
Object classification: Differentiates between a person, vehicle, or other objects.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 57 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Camera tampering detection: Identifies any event that significantly changes the field of view of
the camera.
Loitering: Detects when a person or vehicle remains in a user-defined area of interest for a
configurable length of time.
Take away events: Detects when an object has been removed from a user-defined area of
interest.
Multiline tripwire: Enables the association between two virtual tripwires with respect to
crossing one before the other and relative time between crossing both.
Leave-behind events: Detects when an object has been left behind or inserted in the full view
of a camera.
Enters/exits events: Detects when an object enters or exits a specified area of interest from
any direction within the camera's field of view.
Occupancy: Provides information about the number of people in a user-defined area of
interest.
Dwell time: Provides data about the length of time each person spends in a user-defined area
of interest.
The system uses as input the video feeds from the cameras and use specialized software to detect
events and raise alarms. Alarms and notifications can be distributed through different interfaces, and
even transmitted to mobile devices to security agents on site.
For this particular case, a limited number of fixed IP cameras (around 45) will be needed to cover the
station area under protection: cafeteria, surrounding commercial areas, platforms, corridors and
exterior perimeter. Together with the security cameras, a storage and video analytics system is
required. It is also assumed that in order to operate the system a trained security guard will be needed.
Even if alerts and notifications are automatically transmitted to security guards on site by mobile
devices, another security guard will be needed to supervise the system and detect incidences that
bypass the video analytics software and possible false alarms.
Considering all the above, the approximate CAPEX and OPEX and expected lifetime are:
CAPEX, includes installation, training, software licenses : 1,01 M€
OPEX, includes extra security personnel, maintenance costs, repairs, upgrades: €400.000
Expected lifetime: 10 years.
4.5.3.2.
Risk reduction effects
As indicated above the risk mitigation effect provided by the security measure can be defined by:
Where, φm and ρm are the probability and consequence reduction factors, and Π corresponds to the
probability that there is an attack and it will be successful, that is:
- 58 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
It is expected that the use of a video analytics and surveillance system will have an impact on the
vulnerability, that is, the ability to detect and foil an attack that has been attempted. This is achieved by
the detection of suspicious behaviour or objects thanks to the use of the video analytics system. An
IED planted in the area covered, can be detected prior to its detonation, allowing the neutralization of
the device or the evacuation of the affected area. In order to simplify the analysis, it will be assumed
that the security measure acts only on the vulnerability and not on the consequences, that is, if the
attack is not detected, consequences will remain equal before and after the security measure is
implemented, as the security measure contains no passive components. However if the attack is
detected, it will be completely foiled, with no consequences.
Thus,
As it is assumed that the security measure contains no passive components that can mitigate the
consequences once the attack has been successfully carried out:
Therefore,
The value of ρm needs to be assessed on two components: probability of attack and vulnerability, that is
the influence that the assimilation of the security measure will have on the probability that the attack will
take place, and the capability to deter an attack that has been attempted
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 59 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
For this particular case, it will be considered the worst case scenario where the implementation of the
security measure does not affect the probability that the attack will take place, that is, the adversary
does not modify its intention to attack in the light of the security measure implementation, leaving ρma =
1.
According to the SEST-RAM methodology R[1] the implementation of a video surveillance and
analytics system will reduce the vulnerability by 90%, provided that the system is fully implemented.
Therefore, ρmv=0.1. Considering the above equations:
4.5.4.
Results and sensitivity analysis
As it is shown in section 4.5.3.2, the risk reduction is defined by
The net present value of the security measure will be defined by
Where
CAPEX: is the capital expenditure or initial investment, assumed to take place in time 0
OPEX: is the annual operative expenditure
RRmn: is the Risk Reduction factor of the security measure “m” in the period “n”
As the Risk Reduction factor depends on PA1, V1 and C1, that is on Π1 and C1, it is useful to consider,
how the present value of the investment in the security measure varies with Π1, given that the
consequences are those described in section 4.5.2.6.
The following graph represents the present value of the investment with respect to Π1.
- 60 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Figure 8. Scenario 1, Net present value of security measure
As it can be seen in the graph when the probability of a successful attack (before the implementation of
the security measure) Π1 (or PA1 V1) is higher than 0.12%, the net present value of the security
measure is positive, that is, the security measure considered is cost-efficient. As expected, the higher
the probability, the more cost-efficient the security measure is.
With regards to the vulnerability reduction ρmv, it is expected that the higher it is (i.e. the less the
reduction in vulnerability), the higher the probability of a successful attack will have to be in order for
the security measure to be cost efficient.
Therefore, if we assume that ρmv is 0.5, meaning that the vulnerability is reduced by 50% thanks to the
security measure implementation, we find that for Π1 = 0.22% the security measure is cost-efficient. For
ρmv =0.9 (10% reduction in vulnerability), Π1 = 1.1%.
Below are represented the net present value graphs for values of ρmv 0.5 and 0.9
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 61 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Figure 9. Scenario 1, Net present value of security measure for ρmv 0.5
Figure 10. Scenario 1, Net present value of security measure for ρmv 0.9
With respect to the consequences, as it is sometimes difficult to assess exactly the monetary
consequences of an attack; a simulation with different levels of consequences has been performed.
- 62 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Table 9 displays the net present values for different levels of consequences and different probabilities
of successful attack Π1 (or PA1 V1).
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 63 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.00E-09
1.5E-09
2.25E-09
3.375E-09
5.0625E-09
7.59375E-09
1.13906E-08
1.70859E-08
2.56289E-08
3.84434E-08
5.7665E-08
8.64976E-08
1.29746E-07
1.9462E-07
2.91929E-07
4.37894E-07
6.56841E-07
9.85261E-07
1.47789E-06
2.21684E-06
3.32526E-06
4.98789E-06
7.48183E-06
0.00112%
0.00168%
0.00253%
0.00379%
0.00568%
0.00852%
0.01278%
0.01918%
0.02876%
0.04314%
0.06472%
0.09707%
0.14561%
0.21842%
0.32762%
0.49144%
0.73716%
1.10573%
1.65860%
2.48790%
3.73185%
5.59777%
8.39666%
12.59499%
18.89249%
28.33873%
42.50810%
63.76215%
95.64323%
100.00000%
1.0
1,000 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,357 €
-4,244,357 €
-4,244,356 €
-4,244,355 €
-4,244,354 €
-4,244,351 €
-4,244,348 €
-4,244,342 €
-4,244,334 €
-4,244,322 €
-4,244,305 €
-4,244,278 €
-4,244,237 €
-4,244,177 €
-4,244,086 €
-4,243,950 €
-4,243,745 €
-4,243,439 €
-4,242,979 €
-4,242,290 €
-4,241,255 €
-4,239,704 €
-4,237,377 €
-4,237,059 €
10,000 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,357 €
-4,244,357 €
-4,244,356 €
-4,244,356 €
-4,244,354 €
-4,244,352 €
-4,244,349 €
-4,244,344 €
-4,244,337 €
-4,244,327 €
-4,244,311 €
-4,244,287 €
-4,244,252 €
-4,244,199 €
-4,244,119 €
-4,244,000 €
-4,243,820 €
-4,243,551 €
-4,243,148 €
-4,242,542 €
-4,241,634 €
-4,240,272 €
-4,238,229 €
-4,235,164 €
-4,230,567 €
-4,223,672 €
-4,213,328 €
-4,197,813 €
-4,174,541 €
-4,171,360 €
100,000 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,357 €
-4,244,357 €
-4,244,356 €
-4,244,355 €
-4,244,353 €
-4,244,350 €
-4,244,346 €
-4,244,340 €
-4,244,331 €
-4,244,317 €
-4,244,296 €
-4,244,265 €
-4,244,218 €
-4,244,148 €
-4,244,043 €
-4,243,886 €
-4,243,650 €
-4,243,295 €
-4,242,764 €
-4,241,967 €
-4,240,771 €
-4,238,977 €
-4,236,287 €
-4,232,251 €
-4,226,197 €
-4,217,117 €
-4,203,496 €
-4,183,064 €
-4,152,417 €
-4,106,447 €
-4,037,491 €
-3,934,057 €
-3,778,907 €
-3,546,181 €
-3,514,378 €
1,000,000 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,357 €
-4,244,357 €
-4,244,356 €
-4,244,355 €
-4,244,354 €
-4,244,351 €
-4,244,348 €
-4,244,342 €
-4,244,334 €
-4,244,322 €
-4,244,304 €
-4,244,276 €
-4,244,235 €
-4,244,174 €
-4,244,082 €
-4,243,944 €
-4,243,736 €
-4,243,425 €
-4,242,959 €
-4,242,259 €
-4,241,209 €
-4,239,634 €
-4,237,272 €
-4,233,729 €
-4,228,414 €
-4,220,442 €
-4,208,484 €
-4,190,547 €
-4,163,642 €
-4,123,284 €
-4,062,746 €
-3,971,941 €
-3,835,732 €
-3,631,418 €
-3,324,948 €
-2,865,243 €
-2,175,686 €
-1,141,349 €
410,155 €
2,737,412 €
3,055,448 €
10,000,000 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,358 €
-4,244,357 €
-4,244,357 €
-4,244,356 €
-4,244,356 €
-4,244,354 €
-4,244,352 €
-4,244,349 €
-4,244,344 €
-4,244,337 €
-4,244,326 €
-4,244,310 €
-4,244,286 €
-4,244,250 €
-4,244,196 €
-4,244,116 €
-4,243,994 €
-4,243,812 €
-4,243,539 €
-4,243,129 €
-4,242,515 €
-4,241,593 €
-4,240,211 €
-4,238,137 €
-4,235,027 €
-4,230,361 €
-4,223,362 €
-4,212,864 €
-4,197,117 €
-4,173,496 €
-4,138,065 €
-4,084,919 €
-4,005,199 €
-3,885,619 €
-3,706,249 €
-3,437,194 €
-3,033,613 €
-2,428,240 €
-1,520,180 €
-158,091 €
1,885,042 €
4,949,742 €
9,546,792 €
16,442,368 €
26,785,731 €
42,300,776 €
65,573,342 €
68,753,704 €
CONSEQUENCES
100,000,000 € 1,000,000,000 €
-4,244,358 €
-4,244,351 €
-4,244,357 €
-4,244,347 €
-4,244,357 €
-4,244,342 €
-4,244,356 €
-4,244,334 €
-4,244,355 €
-4,244,321 €
-4,244,353 €
-4,244,303 €
-4,244,350 €
-4,244,275 €
-4,244,346 €
-4,244,234 €
-4,244,340 €
-4,244,171 €
-4,244,330 €
-4,244,078 €
-4,244,316 €
-4,243,937 €
-4,244,295 €
-4,243,727 €
-4,244,264 €
-4,243,411 €
-4,244,216 €
-4,242,938 €
-4,244,145 €
-4,242,227 €
-4,244,039 €
-4,241,162 €
-4,243,879 €
-4,239,564 €
-4,243,639 €
-4,237,166 €
-4,243,279 €
-4,233,570 €
-4,242,740 €
-4,228,176 €
-4,241,931 €
-4,220,085 €
-4,240,717 €
-4,207,948 €
-4,238,897 €
-4,189,742 €
-4,236,166 €
-4,162,434 €
-4,232,070 €
-4,121,473 €
-4,225,925 €
-4,060,030 €
-4,216,709 €
-3,967,865 €
-4,202,884 €
-3,829,619 €
-4,182,147 €
-3,622,249 €
-4,151,042 €
-3,311,195 €
-4,104,384 €
-2,844,613 €
-4,034,396 €
-2,144,740 €
-3,929,416 €
-1,094,931 €
-3,771,944 €
479,783 €
-3,535,737 €
2,841,854 €
-3,181,427 €
6,384,960 €
-2,649,961 €
11,699,619 €
-1,852,762 €
19,671,607 €
-656,964 €
31,629,590 €
1,136,734 €
49,566,564 €
3,827,280 €
76,472,025 €
7,863,099 €
116,830,216 €
13,916,828 €
177,367,504 €
22,997,421 €
268,173,434 €
36,618,311 €
404,382,331 €
57,049,645 €
608,695,675 €
87,696,647 €
915,165,692 €
133,667,149 € 1,374,870,718 €
202,622,903 € 2,064,428,256 €
306,056,534 € 3,098,764,563 €
461,206,980 € 4,650,269,023 €
693,932,649 € 6,977,525,714 €
725,736,262 € 7,295,561,843 €
10,000,000,000 €
-4,244,285 €
-4,244,249 €
-4,244,194 €
-4,244,112 €
-4,243,989 €
-4,243,804 €
-4,243,527 €
-4,243,111 €
-4,242,487 €
-4,241,552 €
-4,240,149 €
-4,238,044 €
-4,234,887 €
-4,230,151 €
-4,223,048 €
-4,212,393 €
-4,196,410 €
-4,172,436 €
-4,136,475 €
-4,082,533 €
-4,001,621 €
-3,880,252 €
-3,698,199 €
-3,425,120 €
-3,015,501 €
-2,401,072 €
-1,479,429 €
-96,964 €
1,976,733 €
5,087,279 €
9,753,097 €
16,751,825 €
27,249,917 €
42,997,055 €
66,617,761 €
102,048,821 €
155,195,411 €
234,915,295 €
354,495,122 €
533,864,862 €
802,919,472 €
1,206,501,387 €
1,811,874,260 €
2,719,933,570 €
4,082,022,533 €
6,125,155,979 €
9,189,856,148 €
13,786,906,401 €
20,682,481,781 €
31,025,844,851 €
46,540,889,456 €
69,813,456,363 €
72,993,817,656 €
100,000,000,000 €
-4,243,628 €
-4,243,263 €
-4,242,716 €
-4,241,895 €
-4,240,663 €
-4,238,815 €
-4,236,043 €
-4,231,886 €
-4,225,650 €
-4,216,295 €
-4,202,264 €
-4,181,217 €
-4,149,646 €
-4,102,290 €
-4,031,256 €
-3,924,704 €
-3,764,877 €
-3,525,137 €
-3,165,526 €
-2,626,110 €
-1,816,985 €
-603,299 €
1,217,231 €
3,948,025 €
8,044,217 €
14,188,505 €
23,404,937 €
37,229,585 €
57,966,556 €
89,072,013 €
135,730,199 €
205,717,477 €
310,698,395 €
468,169,772 €
704,376,837 €
1,058,687,435 €
1,590,153,332 €
2,387,352,176 €
3,583,150,444 €
5,376,847,845 €
8,067,393,946 €
12,103,213,099 €
18,156,941,827 €
27,237,534,920 €
40,858,424,560 €
61,289,759,018 €
91,936,760,707 €
137,907,263,239 €
206,863,017,038 €
310,296,647,736 €
465,447,093,784 €
698,172,762,855 €
729,976,375,784 €
1,000,000,000,000 €
-4,237,059 €
-4,233,409 €
-4,227,934 €
-4,219,721 €
-4,207,403 €
-4,188,925 €
-4,161,209 €
-4,119,634 €
-4,057,272 €
-3,963,729 €
-3,823,415 €
-3,612,943 €
-3,297,235 €
-2,823,674 €
-2,113,331 €
-1,047,818 €
550,452 €
2,947,858 €
6,543,966 €
11,938,128 €
20,029,371 €
32,166,236 €
50,371,534 €
77,679,479 €
118,641,398 €
180,084,277 €
272,248,594 €
410,495,070 €
617,864,784 €
928,919,356 €
1,395,501,213 €
2,095,373,999 €
3,145,183,177 €
4,719,896,945 €
7,081,967,596 €
10,625,073,574 €
15,939,732,540 €
23,911,720,989 €
35,869,703,663 €
53,806,677,673 €
80,712,138,689 €
121,070,330,213 €
181,607,617,499 €
272,413,548,427 €
408,622,444,820 €
612,935,789,409 €
919,405,806,293 €
1,379,110,831,618 €
2,068,668,369,607 €
3,103,004,676,589 €
4,654,509,137,063 €
6,981,765,827,773 €
7,299,801,957,061 €
Table 9. Scenario 1, Net present values for different levels of consequences
As it can be seen on Table 5, if consequences are on the 100,000 € range (this would imply that there
are no fatalities), even if we have full certainty that an attack will occur and will be successful, the
implementation of the security measure is not cost-efficient.
- 64 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
4.6.
1.0
Scenario 2: Arson in commercial area
4.6.1.
Scenario description
This scenario is based around an arson attempt made in the commercial part of the concourse area in
level -1. The fire is initiated in a poorly attended area which allows the arsonist to operate without being
detected. The fire spreads quickly reaching a point where it can’t be controlled, thanks to the lack of fire
detection and suppression system.
It is assumed that there is a visual signalling system in place so that the occupants of the buildings can
identify clearly the exits and escape. However the efficiency of the signals is reduced after a short
period of time due to the effects of the smoke.
As there is no automatic fire detection system, there is no automatic alarm sounded off. However there
is a manual alarm system that has been activated letting the passengers know that there is a fire and
that they need to evacuate the building.
4.6.2.
Consequences
4.6.2.1.
Fatalities and injuries
The basis for the behaviour of the public has been taken from SECURESTATION Deliverable 6.2 R[2],
where the following assumptions have been taken:
Number of passengers in Level -2 (Platform/metro): 1,539.
Number of passengers in Level -1 (concourse): 668.
Number of passengers in Level 0 (street level): 214.
All passengers begin to evacuate at the same time.
The evacuation choice is by shortest distance egress points available.
Given those assumptions the evacuation curve (egress count) for the whole station is represented in
Figure 11.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 65 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Figure 11. Egress count model for whole station
The main results from the simulation are:
Level -2 clears in 2 minutes and 43 seconds.
Level -1 clears in 3 minutes and 32 seconds.
Entire model clears in 4 minutes and 3 seconds
However, it is expected that the effects of the fire and smoke will alter these results. Fire spread by
convection is very dangerous and causes large number of injuries and deaths. When fires start in
enclosed spaces such as buildings, the smoke rising from the fire gets trapped by the ceiling and then
spreads in all directions to form an ever-deepening layer over the entire room space. The smoke will
pass through any holes or gaps in the walls, ceiling and floor into other parts of the building. The heat
from the fire gets trapped in the building and the temperature rises. Smoke produced by a fire also
contains toxic gases which are harmful to people. A fire in a building with modern fittings and materials
generates smoke that is thick and black, obscures vision, causes great difficulty in breathing and can
block the escape routes.
Therefore, it is expected that even though the station has been designed to speed up the evacuation
process there will be some fatalities and injuries due to the effects of the fire.
Although there are no general rules in the literature to assess the number of fatalities and injuries given
a particular fire, there are a number of software tools that can be used to simulate the effects of the fire.
As a general approximation and in a worst case scenario, the following victims will be considered:
1% of the total occupants of Level -1 in the station at the time of the incident result in fatalities
10% of the total occupants of Level -1in the station at the time of the incident result in serious
injuries
15% of the total occupants of Level -1in the station at the time of the incident result in light
injuries
- 66 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
However, the effects of increasing or decreasing number of victims can be seen in the consequences
sensitivity analysis.
The total number of victims and its cost can be seen in Table 10 .
7
11,923,800 €
67
16,032,000 €
100
1,903,800 €
29,859,600 €
Fatalities
Severe Injuries
Light Injuries
TOTAL
Table 10. Scenario 2. Fatalities and injuries
4.6.2.2.
Assets, infrastructure and reconstruction costs
If the fire has grown to be uncontrollable before the fire squads appear, it is reasonable to assume that
most of the building will have been damaged, particularly the -1 and -2 levels.
The total cost of reconstruction will be inferior to the cost of construction because part of the systems
and installations will not suffer extensive damage and will not need to be completely replaced, but it
can be used as a rough approximation.
In order to assess the reconstruction cost the reference figures from the Turner and Townsend report of
construction costs R[43] and the average value of 2,400 € / m2 from Table 7 are used. Hence, the total
cost of reconstruction if damage in two levels is assumed, will be an area of approximately 31.000 m 2
which has a cost of around 74,4 M€.
4.6.2.3.
Income lost as a result of service disruption
The attack in the commercial area, does not affect critical service infrastructures necessary to provide
service. However, if the fire grows uncontrolled, it will surely affect operational infrastructures. If that is
the case, then the service unavailability time will be longer, as these structures will have to be repaired
or substituted.
Therefore, considering that service infrastructure is damaged by the fire, the amount of time necessary
to recover the service will be assumed to be six days for this scenario. Taking a downtime of 6 days,
and using the data in section 4.2.4, the total income lost will be around 6,750,000 €
The number of days of unavailability of the commercial areas is different from the core transportation
service. As the fire is ignited in the commercial area it will be the most affected by the damage. For the
purposes of this study, a total of 45 days of downtime in the commercial area will be used. Taking into
account the data in section 4.2.4, the total income lost is around 2,700,000 €
Thus, total income lost as a result of a disruption both in the primary service and in the commercial
area would be around 9,450,000 €
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 67 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
4.6.2.4.
Costs of alternative means of transport
As indicated in section 4.2.5, it is considered that complimentary service will be provided on the day of
the attack. The following days of service unavailability will be considered in the section 4.5.2.3.
Therefore, considering the suppositions in section 4.2.5, the cost of alternative transport will be around
€950,000.
4.6.2.5.
Income lost due to fear, anxiety, brand image degradation, etc.
Although the assumptions described in section 4.2.6 indicate that an approximation to the income lost
due to psychological and perception factors will be around 10% of the total yearly income, these
conditions can change due to the nature of the attack. An attack with more traditional means like
explosive devices (vehicle borne, personal or planted) is bound to cause a different level of fear and
anxiety and fear than an arson attack as the potential effects are more devastating (higher number of
fatalities), even if they are performed by the same individual or organization. Even though the amount
of income lost may be different, for consistency reasons, the same figure as in other scenarios will be
considered.
4.6.2.6.
Sum of all consequences
Total costs described in previous sections are represented in the following table:
Fatalities and injuries
Asset damage and reconstruction
Income lost (service disruption)
Alternative means of transport
Income lost (fear, anxiety, etc.)
TOTAL
29,859,600 €
19.1%
74,400,000 €
9,450,000 €
950,000 €
42,000,000 €
156,659,600 €
47.5%
6.0%
0.6%
26.8%
Table 11. Scenario 2. Sum of all consequences
The main proportion of the total consequences (47.5%) is the damage and reconstruction costs, while
fatalities and injuries is around 19% of the total consequences.
4.6.3.
Security measure evaluated
The security measure evaluated is a fire detection and suppression system which is comprised of three
main components:
Fire detection subsystem
Fire suppression subsystem: sprinklers
Control subsystem
- 68 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Fire detection
A key aspect of fire safety is to identify a developing fire emergency in a timely manner, and to alert the
building's occupants and fire authorities. Depending on the fire scenario, type of building, and number
and type of occupants, fire detection systems can provide several functions. First they provide a means
to identify an emerging fire; they alert building occupants to a fire emergency and the need to evacuate.
Another common function is the transmission of an alarm notification signal to the fire department or
other emergency response organization. They may also shut down electrical, air handling systems or
special process operations, and they may be used to initiate automatic suppression systems.
Smoke and fire detectors are crucial in life safety applications. As the name implies, these devices are
designed to identify a fire while in its smouldering or early flame stages, replicating the human sense of
smell. The most common fire detectors are spot type units, which are placed along ceilings or high on
walls. They operate on either an ionization or photoelectric principle, with each type having advantages
in different applications. For large open spaces such as galleries and atria, a frequently used smoke
detector is a projected beam unit. This detector consists of two components, a light transmitter and a
receiver, that are mounted at some distance (up to 100m) apart. As smoke migrates between the two
components, the transmitted light beam becomes obstructed and the receiver is no longer able to see
the full beam intensity. This is interpreted as a smoke condition, and the alarm activation signal is
transmitted to the fire alarm panel.
The key advantage of smoke detectors is their ability to identify a fire while it is still in its incipiency. As
such, they provide added opportunity for emergency personnel to respond and control the developing
fire before severe damage occurs.
Control subsystem
The control panel is the "brain" of the fire detection and alarm system. It is responsible for monitoring
the various alarm "input" devices such as manual and automatic detection components, and then
activating alarm "output" devices such as horns, bells, warning lights, emergency telephone dialers,
and building controls. Control panels may range from simple units with a single input and output zone,
to complex computer driven systems that monitor several buildings over an entire area.
Fire suppression
For most fires, water is the ideal extinguishing agent. Most systems use fire sprinklers to deliver water
by direct application onto flames and heat, which causes cooling of the combustion process and
prevents ignition of adjacent combustibles. They are most effective during the fire's initial flame growth
stage, while the fire is relatively easy to control. A sprinkler with an integrated detector will identify the
fire's heat, initiate alarm, and begin suppression within moments after flames appear. In most instances
sprinklers will control fire advancement within a few minutes of their activation, which will in turn result
in significantly less damage than otherwise would happen without sprinklers.
Sprinkler systems are essentially a series of water pipes that are supplied by a reliable water supply. At
selected intervals along these pipes are independent valves known as sprinkler heads. Some sprinkler
systems also include an alarm to alert occupants and emergency forces when sprinkler activation (fire)
occurs.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 69 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Figure 12. Sprinkler system diagram
4.6.3.1.
Cost of the security measure
The Turner & Townsend survey R[43] provides cost rates (€ per square meter) for installing fire
detection and sprinkler systems in different countries around the world, which include the cost of the
system itself. CRTM (Consorcio Regional de Transportes de Madrid) has also provided rates for the
installation of such systems in Spain. Table 12 shows the different cost rates.
Germany
77 € / m2
Ireland
United Kingdom
Spain (source: CTRM)
AVERAGE
70 € / m2
37 € / m2
33 € / m2
54 € / m2
Table 12. Cost rates of sprinkler system installation
For the purposes of this study, an average of the different cost rates has been taken. That would lead
to a total installation cost of around 1,700,000 €. As the system is almost fully automated, there will be
little need for training or other expenses. Therefore, the CAPEX will be equal to the installation cost.
Annual operation costs for this kind of systems can be disregarded as it is very low compared to the
installation costs. Annual operation costs include inspection, maintenance and replacement costs.
- 70 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Sprinkler systems generally have a long life-span and evidence suggests that they require limited
maintenance overall, however a value of 2,000 € per year will be used for the study.
Regarding the average lifetime of fire detection and suppression systems, R[44] suggests a lifetime of
50 years, while R[45, 46] use a period of 20 years. For the purposes of this study, a period of 20 years
will be used as average lifetime of the system.
4.6.3.2.
Risk reduction effects
As we have seen before, the Risk Reduction factor is defined by.
Where, φm and ρm are the probability and consequence reduction factors, and Π corresponds to the
probability that there is an attack and it will be successful, that is:
For the purposes of this study it is assumed that the probability reduction factor is 1, that is, the
probability of a successful arson attack is not modified by the installation of the fire detection and
suppression system (Π1 = Π2), only the consequences are affected.
Some publications R[45] indicate that the installation of fire detection and suppression systems shows
a reduction in damaged area by 73% ~ 82%. Other publications R[44, 47] estimate the effectiveness of
the systems in three different categories: Fatalities, 70% reduction, Injuries 30% reduction and Property
damage 50% reduction. SECURESTATION SEST-RAM methodology R[1] estimates an 80%
reduction, i.e. a φm factor of 0.2
For the purposes of this study a global consequence mitigation factor φm of 0.2 is used, that is, the total
monetary value of the consequences is reduced by 80% (C2 = 0.2  C1). Therefore
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 71 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
4.6.4.
1.0
Results and sensitivity analysis
As it is shown in section 4.6.3.2 the risk reduction is defined by
The net present value of the security measure will be defined by
Where
CAPEX: is the capital expenditure or initial investment, assumed to take place in time 0. 1,7 M€
OPEX: is the annual operative expenditure : 2,000€
RRmn: is the Risk Reduction factor
Given that the Risk Reduction factor depends on Π1 and C1, the cost efficiency of the investment in the
security measure varies with Π1, provided that the consequences are those described in section
4.6.2.6.
Figure 13 represents the present value of the investment with respect to Π1.
Figure 13 . Scenario 2. Cost-efficiency of security measure for φm=0.2
For the conditions defined for this scenario, cost efficiency is achieved when Π1 is around 0.10%.
- 72 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
It is useful to compare the effects of different consequences reduction factors to analyse the costeffectiveness under different circumstances. The lower φm is, (the more the consequences are reduced
by the use of the security measure) the lower the probability of succesfull attack will be necessary to
achieve cost-effectiveness. Figure 14 and Figure 15 show the cost-effectiveness of the security
measure for two different values of φm. When φm is 0.1 (which means that consquences are reduced
by 90%), cost-effectiveness is achieved for probablity of successful attack of Π1=0.09%, while when φm
is 0.5 (consequences are reduced by 50%), cost-effectiveness is achieved for Π1=0.16%.
Figure 14. Scenario 2. Cost-efficiency of security measure for φm=0.1
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 73 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Figure 15. Scenario 2. Cost-efficiency of security measure for φm=0.5
With regard to the consequences, a sensitivity analysis has been performed in order to explore how the
cost-effectiveness of the security measure varies with the monetary value of the consequences.
Table 13 displays the net present values for different levels of consequences and different probabilities
of successful attack Π1 (or PA1 V1).
- 74 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.00E-09
1.5E-09
2.25E-09
3.375E-09
5.0625E-09
7.59375E-09
1.13906E-08
1.70859E-08
2.56289E-08
3.84434E-08
5.7665E-08
8.64976E-08
1.29746E-07
1.9462E-07
2.91929E-07
4.37894E-07
6.56841E-07
9.85261E-07
1.47789E-06
2.21684E-06
3.32526E-06
4.98789E-06
7.48183E-06
1.12227E-05
1.68341E-05
2.52512E-05
3.78768E-05
5.68151E-05
8.52227E-05
0.00013
0.00019
0.00029
0.00043
0.00065
0.00097
0.00146
0.00218
0.00328
0.00491
0.00737
0.01106
0.01659
0.02488
0.03732
0.05598
0.08397
0.12595
0.18892
0.28339
0.42508
0.63762
0.95643
1.00000
1,000 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,179 €
-1,727,179 €
-1,727,178 €
-1,727,176 €
-1,727,174 €
-1,727,170 €
-1,727,165 €
-1,727,157 €
-1,727,145 €
-1,727,127 €
-1,727,101 €
-1,727,060 €
-1,727,000 €
-1,726,910 €
-1,726,775 €
-1,726,572 €
-1,726,268 €
-1,725,811 €
-1,725,127 €
-1,724,100 €
-1,722,559 €
-1,720,248 €
-1,716,782 €
-1,716,308 €
10,000 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,179 €
-1,727,179 €
-1,727,178 €
-1,727,177 €
-1,727,174 €
-1,727,171 €
-1,727,167 €
-1,727,160 €
-1,727,149 €
-1,727,134 €
-1,727,110 €
-1,727,075 €
-1,727,022 €
-1,726,943 €
-1,726,824 €
-1,726,646 €
-1,726,379 €
-1,725,978 €
-1,725,377 €
-1,724,476 €
-1,723,123 €
-1,721,095 €
-1,718,052 €
-1,713,487 €
-1,706,640 €
-1,696,370 €
-1,680,965 €
-1,657,857 €
-1,623,195 €
-1,618,458 €
100,000 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,179 €
-1,727,178 €
-1,727,177 €
-1,727,175 €
-1,727,173 €
-1,727,168 €
-1,727,162 €
-1,727,153 €
-1,727,139 €
-1,727,119 €
-1,727,088 €
-1,727,042 €
-1,726,972 €
-1,726,868 €
-1,726,712 €
-1,726,477 €
-1,726,125 €
-1,725,598 €
-1,724,806 €
-1,723,619 €
-1,721,838 €
-1,719,166 €
-1,715,159 €
-1,709,148 €
-1,700,132 €
-1,686,607 €
-1,666,320 €
-1,635,890 €
-1,590,245 €
-1,521,777 €
-1,419,075 €
-1,265,021 €
-1,033,942 €
-687,323 €
-639,955 €
1,000,000 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,181 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,179 €
-1,727,179 €
-1,727,177 €
-1,727,176 €
-1,727,174 €
-1,727,170 €
-1,727,165 €
-1,727,157 €
-1,727,144 €
-1,727,126 €
-1,727,099 €
-1,727,059 €
-1,726,998 €
-1,726,906 €
-1,726,769 €
-1,726,563 €
-1,726,254 €
-1,725,791 €
-1,725,096 €
-1,724,054 €
-1,722,490 €
-1,720,145 €
-1,716,627 €
-1,711,349 €
-1,703,434 €
-1,691,560 €
-1,673,750 €
-1,647,035 €
-1,606,962 €
-1,546,853 €
-1,456,690 €
-1,321,444 €
-1,118,576 €
-814,274 €
-357,820 €
326,860 €
1,353,880 €
2,894,411 €
5,205,207 €
8,671,400 €
9,145,080 €
10,000,000 €
-1,727,181 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,180 €
-1,727,179 €
-1,727,179 €
-1,727,178 €
-1,727,176 €
-1,727,174 €
-1,727,171 €
-1,727,167 €
-1,727,159 €
-1,727,149 €
-1,727,133 €
-1,727,109 €
-1,727,074 €
-1,727,020 €
-1,726,940 €
-1,726,819 €
-1,726,638 €
-1,726,367 €
-1,725,960 €
-1,725,350 €
-1,724,435 €
-1,723,063 €
-1,721,004 €
-1,717,915 €
-1,713,282 €
-1,706,333 €
-1,695,909 €
-1,680,273 €
-1,656,820 €
-1,621,639 €
-1,568,869 €
-1,489,713 €
-1,370,979 €
-1,192,878 €
-925,726 €
-524,999 €
76,092 €
977,729 €
2,330,184 €
4,358,866 €
7,401,889 €
11,966,424 €
18,813,227 €
29,083,430 €
44,488,735 €
67,596,694 €
102,258,631 €
106,995,430 €
CONSEQUENCES
100,000,000 €
1,000,000,000 €
-1,727,180 €
-1,727,170 €
-1,727,179 €
-1,727,164 €
-1,727,178 €
-1,727,156 €
-1,727,177 €
-1,727,144 €
-1,727,175 €
-1,727,126 €
-1,727,172 €
-1,727,098 €
-1,727,168 €
-1,727,057 €
-1,727,162 €
-1,726,995 €
-1,727,153 €
-1,726,902 €
-1,727,139 €
-1,726,763 €
-1,727,118 €
-1,726,554 €
-1,727,087 €
-1,726,240 €
-1,727,040 €
-1,725,770 €
-1,726,969 €
-1,725,065 €
-1,726,863 €
-1,724,007 €
-1,726,705 €
-1,722,420 €
-1,726,467 €
-1,720,039 €
-1,726,109 €
-1,716,469 €
-1,725,574 €
-1,711,113 €
-1,724,770 €
-1,703,079 €
-1,723,565 €
-1,691,028 €
-1,721,758 €
-1,672,951 €
-1,719,046 €
-1,645,836 €
-1,714,979 €
-1,605,164 €
-1,708,878 €
-1,544,156 €
-1,699,727 €
-1,452,643 €
-1,686,000 €
-1,315,375 €
-1,665,410 €
-1,109,472 €
-1,634,524 €
-800,617 €
-1,588,196 €
-337,336 €
-1,518,704 €
357,587 €
-1,414,466 €
1,399,971 €
-1,258,108 €
2,963,546 €
-1,023,572 €
5,308,910 €
-671,767 €
8,826,955 €
-144,060 €
14,104,023 €
647,500 €
22,019,625 €
1,834,840 €
33,893,028 €
3,615,851 €
51,703,132 €
6,287,366 €
78,418,289 €
10,294,640 €
118,491,023 €
16,305,550 €
178,600,125 €
25,321,915 €
268,763,778 €
38,846,463 €
404,009,257 €
59,133,285 €
606,877,476 €
89,563,518 €
911,179,804 €
135,208,867 €
1,367,633,297 €
203,676,891 €
2,052,313,536 €
306,378,927 €
3,079,333,894 €
460,431,981 €
4,619,864,431 €
691,511,561 €
6,930,660,237 €
1,038,130,932 €
10,396,853,946 €
1,085,498,927 €
10,870,533,895 €
1.0
10,000,000,000 €
-1,727,072 €
-1,727,018 €
-1,726,936 €
-1,726,814 €
-1,726,630 €
-1,726,355 €
-1,725,942 €
-1,725,323 €
-1,724,394 €
-1,723,001 €
-1,720,911 €
-1,717,776 €
-1,713,074 €
-1,706,021 €
-1,695,441 €
-1,679,572 €
-1,655,767 €
-1,620,060 €
-1,566,500 €
-1,486,160 €
-1,365,650 €
-1,184,885 €
-913,737 €
-507,015 €
103,068 €
1,018,192 €
2,390,879 €
4,449,908 €
7,538,453 €
12,171,270 €
19,120,495 €
29,544,333 €
45,180,090 €
68,633,725 €
103,814,178 €
156,584,857 €
235,740,876 €
354,474,905 €
532,575,947 €
799,727,511 €
1,200,454,857 €
1,801,545,876 €
2,703,182,405 €
4,055,637,197 €
6,084,319,387 €
9,127,342,670 €
13,691,877,596 €
20,538,679,984 €
30,808,883,566 €
46,214,188,939 €
69,322,146,999 €
103,984,084,089 €
108,720,883,579 €
100,000,000,000 €
-1,726,093 €
-1,725,550 €
-1,724,734 €
-1,723,511 €
-1,721,677 €
-1,718,925 €
-1,714,796 €
-1,708,604 €
-1,699,316 €
-1,685,384 €
-1,664,486 €
-1,633,138 €
-1,586,117 €
-1,515,585 €
-1,409,788 €
-1,251,091 €
-1,013,046 €
-655,979 €
-120,378 €
683,023 €
1,888,125 €
3,695,778 €
6,407,258 €
10,474,477 €
16,575,306 €
25,726,549 €
39,453,413 €
60,043,711 €
90,929,156 €
137,257,325 €
206,749,577 €
310,987,956 €
467,345,524 €
701,881,877 €
1,053,686,405 €
1,581,393,199 €
2,372,953,388 €
3,560,293,673 €
5,341,304,099 €
8,012,819,739 €
12,020,093,199 €
18,031,003,389 €
27,047,368,674 €
40,571,916,601 €
60,858,738,492 €
91,288,971,328 €
136,934,320,582 €
205,402,344,463 €
308,104,380,285 €
462,157,434,018 €
693,237,014,617 €
1,039,856,385,517 €
1,087,224,380,417 €
1,000,000,000,000 €
-1,716,308 €
-1,710,872 €
-1,702,718 €
-1,690,487 €
-1,672,140 €
-1,644,619 €
-1,603,339 €
-1,541,418 €
-1,448,536 €
-1,309,214 €
-1,100,231 €
-786,757 €
-316,545 €
388,773 €
1,446,750 €
3,033,716 €
5,414,164 €
8,984,837 €
14,340,846 €
22,374,859 €
34,425,879 €
52,502,408 €
79,617,203 €
120,289,395 €
181,297,682 €
272,810,114 €
410,078,761 €
615,981,731 €
924,836,187 €
1,388,117,871 €
2,083,040,397 €
3,125,424,186 €
4,688,999,869 €
7,034,363,394 €
10,552,408,681 €
15,829,476,612 €
23,745,078,508 €
35,618,481,352 €
53,428,585,618 €
80,143,742,017 €
120,216,476,616 €
180,325,578,515 €
270,489,231,363 €
405,734,710,634 €
608,602,929,542 €
912,905,257,903 €
1,369,358,750,445 €
2,054,038,989,258 €
3,081,059,347,478 €
4,621,589,884,807 €
6,932,385,690,801 €
10,398,579,399,792 €
10,872,259,348,794 €
Table 14. Scenario 2, Net present values for different levels of consequences
As it happens with Scenario 1, when consequences are on the level of hundred thousands of Euros,
even if there is absolute certainty that a successful attack will take place, the inclusion of the security
measure will not be cost-efficient. However, it is difficult that these conditions will materialize, because
even a small fire can cause damages beyond that figure. Therefore, this security measure can be
considered to be highly cost-efficient.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 75 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
4.7.
1.0
Scenario 3: PIH dispersion in platform
4.7.1.
Scenario description
This scenario is based upon the release of a toxic gas: Sarin. The gas is released by one individual
(one single source of contamination) using an aerosol container in the -2 level of the station, the
platform area. The attack is carried out during the morning rush-hour period.
Sarin is a human-made chemical toxic agent classified as a nerve agent. Nerve agents are the most
toxic and rapidly acting of the known chemical warfare agents. Sarin is a clear, colourless, and
tasteless liquid that has no door in its pure form. Sarin is the most volatile of the nerve agents; it can
evaporate quickly from a liquid into a vapour and spread into the environment. People can be exposed
to the vapour even if they do not come in contact with the liquid form of Sarin. Because it evaporates so
quickly, Sarin presents an immediate threat.
The amount of harm caused by Sarin depends on the method used for its release. The more effective
the release method is, the greater the damage is caused. For example in the 1995 Tokyo subway
attacks the Sarin was released by piercing container that contained Sarin in liquid form R[37]. This
attack resulted in twelve fatalities and 5,000 people injured; however, the method used was not very
effective. If a more sophisticated method of attack had been used (such as aerosol canisters), the gas
could have been more easily dispersed and the potential damage to people could have been much
greater.
The extent of poisoning caused by Sarin depends on the amount of Sarin to which a person was
exposed, how the person was exposed, and the length of time of the exposure. Symptoms likely will
appear within a few seconds after exposure to the vapour form of Sarin. People may not know that they
were exposed because Sarin has no door. People exposed to a low or moderate dose of Sarin by
breathing contaminated air may experience some or all of the following symptoms (among others)
within seconds to hours of exposure: eye pain, blurred vision, cough, diarrhoea, nausea, vomiting,
drowsiness, weakness, altered heart rate and blood pressure. Exposures to large doses (for a large
period of time in low concentration or for a short period of time in large concentration) may lead to loss
of consciousness, paralysis, and respiratory failure and death.
4.7.2.
Consequences
The consequences of a toxic gas attack are mainly fatalities and injuries, as normally no assets or
structures are damaged. Nevertheless once the attack is detected and the station is closed, some
decontamination activities need to be carried out before the station can be reopened. Therefore, there
will be income lost due to the lack of service. The income lost as a result of fear, anxiety etc. is also
reflected in the consequences.
4.7.2.1.
Fatalities and injuries
The number of fatalities and injuries can be estimated by using the exposure levels tolerable and the
results from the simulations from in SECURESTATION Deliverable 5.1 Part B R[3]. The simulations
output the area affected where the concentration reaches levels that can be harmful to the human body
at a particular height (1,50 m average mouth and nose height), 3 minutes after the toxic agent is
released (the amount of agent used in the simulations is supposed to be fully dispersed in 180
- 76 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
seconds). Therefore it is possible to estimate the approximate proportion of passengers who may suffer
injury or fatality, using the standing crowd density and the affected areas. The effect of a coming train,
which produces a significant change in the air distribution, has not been considered in this particular
case.
The number of fatalities is highly dependent on the efficiency of the dispersion method, for example,
the Tokyo Sarin attacks resulted in only 12 fatalities R[40]. The US Government Accountability Office
estimates that a similar attack carried out in a more efficient way in New York could cause up to 6,000
fatalities R[24].
Depending on the crowd density in the station, fatalities and injuries vary substantially. In a crowded
platform during the rush hour period, the density could be 0.5 p/m 2 and higher. However, during low
traffic periods the density can be 0.1 p/m2 and lower. Table 15 and Table 16 show the number of
fatalities and injuries and the economic value for the scenario considered with different standing crowd
densities.
Therefore, the economic value of the fatalities and injuries can vary from 35 M€ to 172 M€. For the
purposes of this study, a value of 103.6 M€ will be used, which correspond to a density of 0.3 p/m 2.
Area
2
Fatalities
333.8 m
Severe Injuries
69.9 m2
0.1 p/m2
17
0.3 p/m2
50
0.5 p/m2
83
20
60
100
Table 15. Scenario 3. Fatalities and injuries
Fatalities (€)
Severe Injuries (€)
TOTAL
0.1 p/m2
30,345,000 €
0.3 p/m2
89,250,000 €
0.5 p/m2
148,155,000 €
4,800,000 €
14,400,000 €
24,000,000 €
35,145,000 €
103,650,000 €
172,155,000 €
Table 16. Scenario 3. Economic value of fatalities and injuries
4.7.2.2.
Decontamination
The train cars and subway stations exposed to Sarin in the Tokyo incident were decontaminated with
water and detergent combined with industrial-strength cleansers. It was quickly applied and then
washed off. The decontamination was performed by both military personnel and fire fighters. It took
about 3 hours and 20 min on two of the lines, and was completed 9.5 hours after the release occurred.
On the third line it took about 15 hours and was completed 21 hours after the release.
In the case under study the decontamination would be similar to the Tokyo attacks, and it would be
carried out by local, national or regional authorities, therefore, the cost would not be borne by the
station and/or train operator . Consequently, this cost will be excluded from the consequences analysis.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 77 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
4.7.2.3.
1.0
Income lost as a result of service disruption
The attack in the platform area, affects critical service infrastructures. The decontamination process
involved would involve closing the station for some time to perform the necessary actions to ensure
safety for the passengers. The Tokyo subway was reopened two days after the attack R[48], therefore,
considering a similar attack, but with better release mechanisms (aerosol canisters instead of
punctured containers) a 3-day decontamination process would be reasonable. Using the data in section
4.2.4, the total income lost will be around 3.375 M€
The number of days of unavailability for the commercial would be the same as for the core
transportation service area, as the decontamination would affect the whole station (and probably
surrounding areas) using the data in section 4.2.4. the total income lost is around € 135,000
Therefore, total income lost as a result of service disruption would be around 3.51 M€
4.7.2.4.
Costs of alternative means of transport
As indicated in section 4.2.5, it is considered that complimentary service will be provided on the day of
the attack. The following days of service unavailability will be considered in the section 4.7.2.3.
Therefore, considering the assumptions in section 4.2.5, the cost of alternative transport will be around
€ 950,000.
4.7.2.5.
Income lost due to fear, anxiety, brand image degradation, etc.
The assumptions described in section 4.2.6 indicate that an approximation to the income lost due to
psychological and perception factors will be around 10% of the total yearly income: 42 M€.
4.7.2.6.
Sum of all consequences
Total costs described in previous sections are represented in Table 17:
Fatalities and injuries
Asset damage and reconstruction
Income lost (service disruption)
Alternative means of transport
Income lost (fear, anxiety, etc.)
TOTAL
103,650,000 €
69.0%
- €
0.0%
3,510,000 €
950,000 €
42,000,000 €
150,110,000 €
2.3%
0.6%
28.0%
Table 17. Scenario 3. Sum of all consequences
As expected, for this kind of attack, the main part of the total consequences corresponds to Fatalities
and injuries (69 %), the other important factor is the income lost to fear, anxiety, etc., which amounts to
28%.
- 78 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
4.7.3.
1.0
Security measure evaluated
The security measure used for this study is a toxic gas detection system capable of detecting several
types of toxic gases like Sarin, Tabun, Soman, Cyclosarin, Mustard Gas, Hydrogen Cyanide, etc.
Usually, this type of detectors uses a 2-array sensor solution. The first array consists of Surface
Acoustic Wave (SAW) micro-sensors used to detect nerve and blister agents. SAW sensors are
piezoelectric crystals that detect the mass of chemical vapours absorbed into chemically selective
coatings on the sensor surface. This absorption causes a change in the resonant frequency of the
sensor. The internal microcomputer measures these changes and uses them to determine the
presence and concentration of chemical agents. The secondary array is an optional configuration of
electrochemical cells and is employed for broad detection of Toxic Industrial Chemicals (TICs).
A series of fixed units containing these detectors can be placed in areas in the station at risk, as well as
in the ventilation system. Commercial units are capable of communicating with a wide variety of
systems through both wireless and wired connections. A central control system
Basic considerations for installing a fixed system are:
To install it so that it will monitor every part of the station or premises where a risk exists.
The system must give early warning of the presence and location of gas in order to initiate one
or more of the following:
o evacuation of the premises
o control of ventilation
The units draw air from the surroundings 6-20 meters around through fans and continually monitor the
presence of toxic substances (each 5 seconds for electrochemical cells and 30 seconds for SAW
sensors). Once the substance is detected, an alarm is raised in the detection unit and it is
communicated to the central control system, then, the threat protocol can be initiated, which will involve
control of the ventilation and evacuation of the premises. Commercial units, normally have both
acoustic and visual alarms. The fixed units are placed 6-20 meters apart, to allow detection in the
whole area.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 79 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Figure 16. Example of toxic gas detection units used in a train platform
In the station model used for the simulations, the two rail lines are around 16 meters apart, which would
mean that a series of detection units would be needed in each of the three platforms. Given this
condition, around 15 detection units (5 for each platform) would be needed to cover the entire platform
area.
4.7.3.1.
Risk reduction effects
The Risk Reduction factor is defined by.
Where, φm and ρm are the probability and consequence reduction factors, and Π corresponds to the
probability that there is an attack and it will be successful.
For this particular security measure, it is expected that the assimilation of the detection system would
interfere in the intention of the adversary to attack, knowing that the attack will be less successful by
the presence of the security measure, thus altering the probability of attack, but for simplicity purposes
it will be disregarded. Consequently, it is assumed that the security measure influences only in the
reduction of the consequences of the attack.
The consequences reduction factor assumes that in order for the security measure to be effective,
there should be an evacuation procedure in place and both security and operational personnel should
- 80 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
have received training in order to lead the evacuation of the station. There is also the assumption that
the detection system is connected to the HVAC system, so the air flow can be modified as a response
to an alarm being raised. Simulations R[3] show that the effect of ventilation can be detrimental
depending on the number of changes of air per hour. From the simulations performed for Sarin and VX
agent, slow ventilation (3 air changes per hour) cause a small improvement, reducing the area over
which fatalities will occur. However, at the higher rates there is a greater dilution and mixing of the
Sarin and VX agents with air, causing them to be dispersed at still lethal concentrations over a wider
area.
The SEST-RAM R[1] indicates that a the assimilation of a system for the detection of biological hazards
would reduce the consequences up to 75%, consequently a value for φm 0.25 will be used.
Thus, the Risk Reduction factor would be:
4.7.3.2.
Cost of the security measure
A guide published by de Department of Justice of the US R[49] provides a review and description of the
available sensor / detection systems in the market for both military and civil applications. Together with
the description an indication of unit costs (cost of the equipment including the cost of all consumables
and support equipment) is provided, which includes an average of service and maintenance costs.
For fixed detection systems, an average value is around 106,000 $ (in 2012 prices) per unit, which
would translate to around 78,250 €. Bringing the total cost of the equipment to around 1.17 M€.
The installation cost of the system varies depending on the nature of the detection unit. A wireless
system doesn’t need data cables to be laid out, thus reducing the costs of installation. For the purposes
of this study the installation cost is estimated to be 100,000 € which is around 10% of the total cost of
the equipment.
Therefore the total CAPEX would be around 1,27 M€.
The guide by the US DoJ R[49] provides information about average maintenance cost of detection
systems. The sensors inside the detection units are the critical part of the system and need to be
calibrated regularly, this process can be expensive. The guide by the US DoJ R[49] estimates that for
some fixed systems the annual maintenance cost provided by the manufacturer can be between 1020% of the unit cost. Assuming a 20% factor, the annual OPEX would be around 235,000 €.
As modern systems are relatively easy to operate, with the application graphical user interfaces and
central control, the training cost of the personnel can be disregarded.
The average lifetime of commercial detection systems is between 10 and 20 years, including a change
of sensors every 2-3 years. In this particular case a lifetime of 15 years will be used.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 81 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
4.7.4.
1.0
Results and sensitivity analysis
The net present value of the security measure will be defined by
Where
CAPEX: is the capital expenditure or initial investment, assumed to take place in time 0. 1,27
M€
OPEX: is the annual operative expenditure : 235,000€
RRmn: is the Risk Reduction factor of the security measure “m” in period “n”
As the Risk Reduction factor depends on Π1 and C1, the cost efficiency of the investment in the security
measure varies with Π1, given that the consequences are those described in section 4.7.2.6
Figure 17 represents the present value of the investment with respect to Π1.
Figure 17. Scenario 3. Cost-efficiency of security measure for φm=0.25
- 82 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
For this scenario, cost efficiency is achieved when Π1 is around 0.33%.
As with the other scenarios, the effects of different consequences reduction factors are analysed in
order to test the cost-effectiveness under different circumstances. Figure 18 and Figure 19 show the
cost-effectiveness of the security measure for two different values of φm, that is, two different levels of
consequences reduction. When φm is 0.1 (which means that consquences are reduced by 90%), costeffectiveness is achieved for probablity of successful attack of Π1=0.26%, while when φm is 0.5
(consequences are reduced by 50%), cost-effectiveness is achieved for Π1=0.47%.
Figure 18. Scenario 3. Cost-efficiency of security measure for φm=0.1
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 83 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Figure 19. Scenario 3. Cost-efficiency of security measure for φm=0.5
A sensitivity analysis with different levels of economic value of consequences, from 1000 € to 1 Billion
€ has been performed in order to explore which probability of attack values make the security measure
cost-efficient.
Table 18 displays the net present values for different levels of consequences and different probabilities
of successful attack Π1 (or PA1  V1).
- 84 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.00E-09
1.5E-09
2.25E-09
3.375E-09
5.0625E-09
7.59375E-09
1.13906E-08
1.70859E-08
2.56289E-08
3.84434E-08
5.7665E-08
8.64976E-08
1.29746E-07
1.9462E-07
2.91929E-07
4.37894E-07
6.56841E-07
9.85261E-07
1.47789E-06
2.21684E-06
3.32526E-06
4.98789E-06
7.48183E-06
1.12227E-05
1.68341E-05
2.52512E-05
3.78768E-05
5.68151E-05
8.52227E-05
0.00013
0.00019
0.00029
0.00043
0.00065
0.00097
0.00146
0.00218
0.00328
0.00491
0.00737
0.01106
0.01659
0.02488
0.03732
0.05598
0.08397
0.12595
0.18892
0.28339
0.42508
0.63762
0.95643
1.00000
1,000 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,570 €
-3,886,570 €
-3,886,569 €
-3,886,569 €
-3,886,567 €
-3,886,566 €
-3,886,563 €
-3,886,559 €
-3,886,553 €
-3,886,544 €
-3,886,530 €
-3,886,510 €
-3,886,479 €
-3,886,433 €
-3,886,364 €
-3,886,260 €
-3,886,104 €
-3,885,871 €
-3,885,521 €
-3,884,996 €
-3,884,208 €
-3,883,026 €
-3,881,254 €
-3,881,012 €
10,000 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,570 €
-3,886,570 €
-3,886,570 €
-3,886,569 €
-3,886,568 €
-3,886,566 €
-3,886,564 €
-3,886,560 €
-3,886,555 €
-3,886,547 €
-3,886,535 €
-3,886,517 €
-3,886,490 €
-3,886,450 €
-3,886,389 €
-3,886,298 €
-3,886,161 €
-3,885,956 €
-3,885,649 €
-3,885,188 €
-3,884,496 €
-3,883,459 €
-3,881,903 €
-3,879,569 €
-3,876,068 €
-3,870,817 €
-3,862,940 €
-3,851,124 €
-3,833,401 €
-3,830,979 €
100,000 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,570 €
-3,886,570 €
-3,886,570 €
-3,886,569 €
-3,886,568 €
-3,886,567 €
-3,886,565 €
-3,886,562 €
-3,886,557 €
-3,886,550 €
-3,886,539 €
-3,886,524 €
-3,886,500 €
-3,886,464 €
-3,886,411 €
-3,886,331 €
-3,886,211 €
-3,886,031 €
-3,885,762 €
-3,885,357 €
-3,884,750 €
-3,883,839 €
-3,882,473 €
-3,880,424 €
-3,877,351 €
-3,872,740 €
-3,865,825 €
-3,855,452 €
-3,839,892 €
-3,816,553 €
-3,781,544 €
-3,729,031 €
-3,650,260 €
-3,532,105 €
-3,354,872 €
-3,330,652 €
1,000,000 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,570 €
-3,886,570 €
-3,886,569 €
-3,886,569 €
-3,886,567 €
-3,886,566 €
-3,886,563 €
-3,886,559 €
-3,886,553 €
-3,886,543 €
-3,886,529 €
-3,886,509 €
-3,886,477 €
-3,886,431 €
-3,886,360 €
-3,886,255 €
-3,886,097 €
-3,885,860 €
-3,885,505 €
-3,884,972 €
-3,884,173 €
-3,882,973 €
-3,881,175 €
-3,878,476 €
-3,874,429 €
-3,868,358 €
-3,859,251 €
-3,845,591 €
-3,825,101 €
-3,794,366 €
-3,748,264 €
-3,679,110 €
-3,575,380 €
-3,419,784 €
-3,186,391 €
-2,836,301 €
-2,311,166 €
-1,523,463 €
-341,910 €
1,430,421 €
1,672,623 €
10,000,000 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,571 €
-3,886,570 €
-3,886,570 €
-3,886,570 €
-3,886,569 €
-3,886,568 €
-3,886,566 €
-3,886,564 €
-3,886,560 €
-3,886,555 €
-3,886,547 €
-3,886,535 €
-3,886,516 €
-3,886,489 €
-3,886,448 €
-3,886,386 €
-3,886,294 €
-3,886,155 €
-3,885,947 €
-3,885,635 €
-3,885,167 €
-3,884,465 €
-3,883,413 €
-3,881,833 €
-3,879,465 €
-3,875,911 €
-3,870,581 €
-3,862,586 €
-3,850,594 €
-3,832,606 €
-3,805,623 €
-3,765,149 €
-3,704,438 €
-3,613,372 €
-3,476,772 €
-3,271,873 €
-2,964,523 €
-2,503,499 €
-1,811,964 €
-774,660 €
781,296 €
3,115,229 €
6,616,130 €
11,867,480 €
19,744,505 €
31,560,043 €
49,283,351 €
51,705,366 €
CONSEQUENCES
100,000,000 €
1,000,000,000 €
-3,886,570 €
-3,886,565 €
-3,886,570 €
-3,886,563 €
-3,886,570 €
-3,886,559 €
-3,886,569 €
-3,886,552 €
-3,886,568 €
-3,886,543 €
-3,886,567 €
-3,886,529 €
-3,886,565 €
-3,886,508 €
-3,886,562 €
-3,886,476 €
-3,886,557 €
-3,886,429 €
-3,886,550 €
-3,886,357 €
-3,886,539 €
-3,886,250 €
-3,886,523 €
-3,886,090 €
-3,886,499 €
-3,885,850 €
-3,886,463 €
-3,885,489 €
-3,886,409 €
-3,884,948 €
-3,886,328 €
-3,884,137 €
-3,886,206 €
-3,882,920 €
-3,886,023 €
-3,881,094 €
-3,885,749 €
-3,878,355 €
-3,885,339 €
-3,874,247 €
-3,884,722 €
-3,868,085 €
-3,883,798 €
-3,858,842 €
-3,882,412 €
-3,844,978 €
-3,880,332 €
-3,824,182 €
-3,877,213 €
-3,792,987 €
-3,872,533 €
-3,746,195 €
-3,865,515 €
-3,676,007 €
-3,854,986 €
-3,570,725 €
-3,839,194 €
-3,412,802 €
-3,815,506 €
-3,175,917 €
-3,779,973 €
-2,820,590 €
-3,726,674 €
-2,287,599 €
-3,646,725 €
-1,488,113 €
-3,526,802 €
-288,884 €
-3,346,918 €
1,509,959 €
-3,077,092 €
4,208,224 €
-2,672,352 €
8,255,622 €
-2,065,242 €
14,326,719 €
-1,154,578 €
23,433,363 €
211,419 €
37,093,331 €
2,260,414 €
57,583,281 €
5,333,907 €
88,318,207 €
9,944,146 €
134,420,597 €
16,859,504 €
203,574,181 €
27,232,542 €
307,304,557 €
42,792,098 €
462,900,120 €
66,131,433 €
696,293,466 €
101,140,435 €
1,046,383,484 €
153,653,937 €
1,571,518,512 €
232,424,191 €
2,359,221,054 €
350,579,573 €
3,540,774,866 €
527,812,645 €
5,313,105,585 €
552,032,801 €
5,555,307,145 €
1.0
10,000,000,000 €
-3,886,515 €
-3,886,488 €
-3,886,446 €
-3,886,383 €
-3,886,290 €
-3,886,149 €
-3,885,938 €
-3,885,621 €
-3,885,146 €
-3,884,434 €
-3,883,365 €
-3,881,762 €
-3,879,358 €
-3,875,752 €
-3,870,342 €
-3,862,228 €
-3,850,056 €
-3,831,798 €
-3,804,412 €
-3,763,333 €
-3,701,714 €
-3,609,285 €
-3,470,642 €
-3,262,677 €
-2,950,730 €
-2,482,810 €
-1,780,929 €
-728,108 €
851,124 €
3,219,971 €
6,773,242 €
12,103,148 €
20,098,008 €
32,090,297 €
50,078,731 €
77,061,383 €
117,535,360 €
178,246,325 €
269,312,773 €
405,912,445 €
610,811,953 €
918,161,214 €
1,379,185,107 €
2,070,720,946 €
3,108,024,704 €
4,663,980,342 €
6,997,913,799 €
10,498,813,984 €
15,750,164,261 €
23,627,189,677 €
35,442,727,801 €
53,166,034,987 €
55,588,050,590 €
100,000,000,000 €
-3,886,015 €
-3,885,737 €
-3,885,320 €
-3,884,695 €
-3,883,757 €
-3,882,350 €
-3,880,239 €
-3,877,073 €
-3,872,323 €
-3,865,200 €
-3,854,514 €
-3,838,485 €
-3,814,443 €
-3,778,378 €
-3,724,282 €
-3,643,137 €
-3,521,421 €
-3,338,845 €
-3,064,982 €
-2,654,188 €
-2,037,996 €
-1,113,709 €
272,722 €
2,352,368 €
5,471,838 €
10,151,043 €
17,169,849 €
27,698,060 €
43,490,375 €
67,178,848 €
102,711,557 €
156,010,621 €
235,959,218 €
355,882,112 €
535,766,454 €
805,592,966 €
1,210,332,735 €
1,817,442,388 €
2,728,106,867 €
4,094,103,586 €
6,143,098,664 €
9,216,591,282 €
13,826,830,209 €
20,742,188,599 €
31,115,226,184 €
46,674,782,561 €
70,014,117,127 €
105,023,118,977 €
157,536,621,750 €
236,306,875,911 €
354,462,257,152 €
531,695,329,013 €
555,915,485,037 €
1,000,000,000,000 €
-3,881,012 €
-3,878,232 €
-3,874,063 €
-3,867,809 €
-3,858,428 €
-3,844,356 €
-3,823,248 €
-3,791,587 €
-3,744,095 €
-3,672,857 €
-3,566,000 €
-3,405,714 €
-3,165,286 €
-2,804,644 €
-2,263,680 €
-1,452,234 €
-235,066 €
1,590,687 €
4,329,316 €
8,437,260 €
14,599,175 €
23,842,048 €
37,706,358 €
58,502,823 €
89,697,520 €
136,489,565 €
206,677,633 €
311,959,735 €
469,882,888 €
706,767,618 €
1,062,094,712 €
1,595,085,354 €
2,394,571,317 €
3,593,800,261 €
5,392,643,677 €
8,090,908,801 €
12,138,306,487 €
18,209,403,016 €
27,316,047,809 €
40,976,014,999 €
61,465,965,784 €
92,200,891,962 €
138,303,281,228 €
207,456,865,128 €
311,187,240,977 €
466,782,804,751 €
700,176,150,413 €
1,050,266,168,905 €
1,575,401,196,642 €
2,363,103,738,249 €
3,544,657,550,659 €
5,316,988,269,274 €
5,559,189,829,513 €
Table 18. Scenario 3, Net present values for different levels of consequences
As it happens with other Scenarios, when consequences are on the range of hundred thousands of
Euros, even if there is absolute certainty that a successful attack will take place, the introduction of the
security measure will not be cost-efficient. Nevertheless, it is difficult to envisage that an attack with
Sarin gas will result in this level of consequences, as even the Tokyo attacks which were considered to
be relatively inefficient resulted in 12 fatalities.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 85 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
5.
1.0
Conclusions
A terrorist attack can have dramatic consequences for both victims and society in general. A socioeconomic analysis tries to assess all the effects of a terrorist attack, not only those directly related to it.
The impact of a terrorist attack can be divided into direct and indirect consequences of it, as well as
short and long lasting consequences.
It can be considered as direct consequences those that take place as an immediate result of the attack,
such as damage to buildings and property and loss of life and injuries. Conversely, indirect
consequences are those that result from a change in the behaviour of the social patterns or the
economic system as a consequence of the attack, such as changes in lifestyle, investment and
consumption patterns, new security measures put in place, etc.
While direct consequences are usually straight forward to calculate, indirect consequences are more
difficult to estimate, and largely depend on factors such as the magnitude of the terrorist attack,
whether the attack is isolated or is part of a campaign of attacks, the perpetrators of the attack, the
country, the method used for the attack, etc.
5.1.
Direct consequences
With respect to direct consequences, the most challenging to calculate is the economic value of
fatalities and injuries. Even though there are many approaches to this evaluation, one of the most
widely used is the evaluation used is the one based on the willingness to pay (WTP) which leads to the
value of a statistical life (VSL), injury, etc. However, this methodology produces different values
depending on the general socio-economic level of the state or region for which it is calculated, as the
willingness to pay to reduce the likelihood of fatalities is different depending on the economic status.
Despite of this fact, it is recommended to use this methodology to establish the economic value of
fatalities and injuries.
Direct consequences are easy to calculate ex-post. However, it is difficult to estimate the economic
value before the attack has taken place. Thanks to computer simulation techniques it is possible to
estimate the areas of impact of an attack with explosives, fire or other types of attacks. The area of
impact of the attack can be used to estimate many direct consequences derived from the attack such
as:
Number of fatalities and injuries and their value
Hospitalization costs
First response costs
Damaged assets and property
Clearing/isolation of the area under impact
Other direct consequences estimations can be based on the activity of the station, or network. The
amount of passengers and flow of trains, subway trains, and buses can be used to estimate the cost of
a period in which the station would be closed as a result of an attack. It can also be used to estimate
the number of passengers that would need to be transported by alternative means to their destinations.
- 86 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
5.2.
1.0
Indirect consequences
Indirect consequences are much more problematic to estimate, as they arise as the result of a change
in behaviour in the public in general, caused by the terrorist attack. Although there are studies that
analyse the indirect impact of several terrorist attacks, like 9/11 or the Madrid Bombings, there is no
general model that can be used to estimate indirect consequences ex-ante.
Some of the indirect consequences are borne by the public transport operator (PTO) like the loss of
income as a result of passengers modifying their normal usage patterns of public transport, while other
consequences are borne by society in general, like the impact on the tourist industry as a result of
tourists cancelling travel plans to the region or country in the wake of an attack.
Indirect consequences include:
Loss of income for the PTO/IM and other PTOs/IMs due to fear, anxiety, brand image, etc.
Extra insurance costs derived from the attack
General impact on the economy.
The general impact on the economy at macroeconomic level depends on many variables; however
detrimental effects in various sectors of the economy as a result of terrorist attacks have been
documented:
Tourism
Foreign and local investment
Consumption and savings
Stock markets
Foreign trade.
Urban economy
5.3.
Cost-benefit analysis of security measures
When facing the decision of investing in a security measure, a number of considerations need to be
made, and among them, the cost-efficiency of the security measure should be taken into account.
The most used tool to evaluate the profitability of an investment is a cost benefit analysis of the security
measure. The analysis is based on the monetary evaluation of the benefits and costs that the
implementation of the security measure would bring.
The evaluation of the cost of a security measure should take into account the expenditure being made
in order to implement the security measures, such as installation costs, staff, maintenance, etc. and
other costs that include the effect that such measures have on the PTO/IM business, such as the
acceptability of the security measure by the passengers, the changes in the management of operations
(increased delays caused by screening, modification of the station premises in order to implement
particular safeguards, etc.).
Benefits can be evaluated by using the SEST-RAM methodology R[1], calculating the risk reduction
effect that the implementation of the security measure would cause, either by reducing the probability
of attack, the vulnerability and/or mitigating the consequences of the attack.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 87 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Given both, costs and benefits, the present value of the costs and the benefits is calculated in order to
measure the cost-effectiveness of the security measure.
As the benefits depend largely on the probability of the attack, vulnerability and consequences
reduction effect, it is recommended to perform a sensitivity analysis using different values for these
parameters in order to explore the cost-effectiveness under different circumstances.
- 88 -
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved
Date:
30/11/2013
Document ID: SECEST-WP7.1-ISD-DE-PU_V1.0
Revision:
1.0
Annex A. Generic tool for calculating cost-efficiency of
security measures
See MS. Excel file attached.
D.7.1 – SOCIO ECONOMIC POTENTIAL IMPACT
- 89 -
This project has been carried out under a contract awarded by the European Commission
No part of this report may be used, reproduced and/or disclosed in any form or by any means without the prior written permission of the SECURESTATION project
partners.
© 2011 – All rights reserved