Transport Economics, Management and Policy series
Chapter 2: The scale and nature of the terrorist problem
The average man does not want to be free. He simply wants to be safe H.L. Mencken. Much of the concern with national security centers on ideas of protecting a country’s ‘critical’ infrastructure, as well as on more immediate attacks on its citizens. The exact definition of what constitutes ‘critical’ is, however, unclear, as is that of ‘infrastructure’. Both terms are also at times prone to various forms of political capture, although there is a general notion that critical infrastructure embraces the assets, systems and networks, whether physical or virtual, so vital to a nation that their incapacitation or destruction would have a debilitating effect on a nation’s economic security, public health or safety. More concretely, the US Critical Infrastructure Protection Board (CIPB) in 2003 defined critical infrastructure as, ‘the physical and cyber assets of public and private institutions residing in the following sectors: agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking and finance, chemicals and hazardous materials, and postal and shipping’. The European Union’s Commission has laid out the European Union’s Programme for Critical Infrastructure Protection (EPCIP) in Directives (European Commission, 2006). Actions focus on infrastructure that, if disrupted or destroyed, would significantly affect two or more Member States or a single Member State if the critical infrastructure is located in another Member State. With due regard to existing Community competences, the responsibility for protecting national critical infrastructures falls on its owners/operators and on the Member States involved.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.