U.S. Department of Transportation
Federal Highway Administration
1200 New Jersey Avenue, SE
Washington, DC 20590
202-366-4000


Skip to content U.S. Department of Transportation/Federal Highway AdministrationU.S. Department of Transportation/Federal Highway Administration

Bridges & Structures

<< Previous Contents Next >>

Recommendations for Bridge and Tunnel Security

Appendix B: Operational Security Practices

This list of Operational Security Practices was developed during the AASHTO/FHWA BRP initial meeting to ensure that the panel considered the full range of security strategies. Following the initial meeting, the panel focused more narrowly on the design and engineering considerations contained in the body of this report.

Management and Operational Practices

  • Best Practices. Current and timely exchange of practical information among owners and operators concerning the potential for and counters to terrorist attacks and related matters
  • Practice Review. Process for reviewing overall security management practices, including personnel policies, training, procedures, and use of technology
  • Institutional Relationships. Clarification and/or establishment of roles and responsibilities among federal, state, and local entities and effective partnerships for preventing, defeating, and responding to terrorists' attacks
  • Preparedness. Guidance to owners/operators regarding preparations for responding to terrorists' attacks, including coordination with other federal, state, and local agencies, communication protocols, and equipment interoperability
  • Personnel and Vehicle Security. Guidance to operators for ensuring that employees, contractors, vendors, visitors, and the vehicles they operate are authorized, verified, and authenticated, as appropriate
  • Communication/Outreach. Communication strategies for community outreach and coordination of sensitive information (e.g., with other agencies, media, private sector entities)

Information Security

  • Procurement Practices. Means for procuring security-sensitive technologies without public disclosure and for soliciting construction bids without disclosing security-sensitive design features
  • Information Security. Means for controlling public access to "as built" drawings and related information

Mobilization ("notice") and Response ("trans-event")

  • Threat Warning. Means (protocols) for timely notification of owners/operators concerning imminent threats to specific assets
  • Early Response. Policies and processes for interdicting identified threats, informing/instructing travelers, and evacuating facilities
  • Initial Response. Policies, process, and technologies needed to execute the preparedness plan in response to terrorists' attacks

Recovery (Post-event)

  • Damage Assessment. Procedures and technologies that assist in initial assessment of structural damage to the asset to determine the effect of the attack on functionality (e.g., closure, restricted use)
  • Functional Continuity. Contingency plans for reestablishing asset functionality (including use of available alternatives, emergency repairs)
<< Previous Contents Next >>
Updated: 06/25/2013
Federal Highway Administration | 1200 New Jersey Avenue, SE | Washington, DC 20590 | 202-366-4000