Brochure More information from http://www.researchandmarkets.com/reports/306049/ Fundamentals of Energy Infrastructure Security: Risk Mitigation in the International Environment Description: The world's most comprehensive single source of intelligence on physical security issues in the global energy sector.this all-encompassing new report examines threats to the energy industry from vandalism, terrorism, low-intensity conflict and war. It provides a guide to effective risk-mitigation techniques for energy companies operating in difficult security environments and includes the only single-source compilation available of historical and current energy infrastructure security challenges and incidences in 40 countries and energy producing regions. This unique work, the result of more than a decade of on-the-ground research, will help companies and governments pool information about energy sector attacks around the world and significantly enhance the ability of companies to make accurate threat assessments, optimise security planning and protect facilities more effectively. Written by Paul Hueper, an expert on global comparative energy infrastructure security issues who has assisted both governments and companies in meeting energy security challenges. Contents: Part 1: Overview of Global Energy-Infrastructure Security Energy security: a worldwide problem - The cold war - Low-intensity conflict - New terrorist threats - The changing nature of energy- infrastructure security Threats and motivations - Vandals and saboteurs - Criminal activity - Low-intensity conflict - Terrorism - Trans-national conflict Weapons and tactics - Vandalism - Sabotage - Development of guerrilla strategies - Guerrilla tactics - Guerrilla attacks on energy infrastructure in Colombia - Guerrilla and terrorist weapons: regular and improvised - Terrorism - Energy-company operations in high-risk areas - Nigeria - Colombia - Algeria - Yemen - Pakistan - India - Ecuador - Lessons learned
Part 2: Energy Infrastructure Vulnerability Energy infrastructure vulnerability overview - Oil and gas infrastructure - Oil and gas pipeline vulnerability - Offshore infrastructure vulnerability - Tanker security: war, piracy and terrorism - Electricity-infrastructure vulnerability Oil and gas infrastructure: upstream, downstream and export-facility vulnerability - Geophysical-survey equipment and drilling rigs - Oil and gas wells - Upstream and downstream processing facilities - Refineries - Oil-storage facilities and tank farms - Oil and gas export infrastructure Oil and gas pipeline vulnerability - Pipeline operation and design - Products-pipeline considerations - Pipeline security considerations Offshore oil and gas security - Vulnerabilities of offshore infrastructure - Factors affecting offshore security - Offshore risk-mitigation measures Tanker vulnerability: war, piracy and terrorism - Zones of conflict - Piracy: a threat to global shipping - Terrorism - LNG tanker security concerns - Risk mitigation Electricity infrastructure vulnerability - Power system disruption - Vulnerability overview - Generation infrastructure vulnerability - Substation vulnerability - Transmission and distribution network vulnerability Part 3: Risk Mitigation Developing a risk-mitigation strategy - Threat assessment - Physical security and facility hardening - Cost-benefit analysis - The host government role - Incident response capability - Personnel security - Community relations - Environmental response - Developing an integrated security plan Threat assessment
- Inventorying assets - Identifying vulnerabilities - Compiling threat data - Diverse threat profile - Capability a key factor - Making an assessment Physical Security of Energy Infrastructure - Perimeter security - Electronic monitoring and intrusion detection - Hardening of infrastructure assets - Pipeline surveillance and monitoring - Pipeline communications security Conducting a cost-benefit analysis - The cost of deterrence - Making cost-benefit decisions - Advance planning is cost-effective The host government's role - Government responses around the world - Host-government security challenges - The reality of host-government response capability - Host-government/company relationships Developing surveillance and incident-response capabilities - The government's role - Post-incident investigation - Company response plan - Incident-repair response Personnel security - Kidnapping threat - Motivations - Ensuring personnel security - Security in the field - Security in exploration phases - Pipeline spread security Community relations - Global experiences - Key aspects of community-relations programmes - Security benefits Environmental response - Real world issues - Environmental issues and security Developing an integrated security plan - Threat assessments are for real - What is the real cost? - Preparing for the worst - Picking the right team - Host-government liaison - Community relations
- Developing an integrated security plan Maps and illustrations Part 4: Country Profiles - Afghanistan - Albania - Algeria - Angola - Bangladesh - Bolivia - Brazil - Canada - The Caspian region - Chad - Chile - China - Colombia - Congo (Brazzaville) - Democratic Republic of Congo (DRC) - Ecuador - Ethiopia - Former Yugoslavia - Guatemala - India - Indonesia - Iran-Iraq War - Iraq - Kuwait - Mexico - Mozambique - Myanmar (Burma) - Nigeria - Pakistan - Papua New Guinea - Peru - Philippines - Russia - Saudi Arabia - Singapore - South Africa - South China Sea - Sri Lanka - Sudan - Thailand - Turkey - Uganda - United Kingdom - United States - Venezuela - Yemen Ordering: Order Online - http://www.researchandmarkets.com/reports/306049/ Order by Fax - using the form below Order by Post - print the order form below and send to Research and Markets, Guinness Centre,
Taylors Lane, Dublin 8, Ireland.
Page 1 of 2 Fax Order Form To place an order via fax simply print this form, fill in the information below and fax the completed form to 646-607-1907 (from USA) or +353-1-481-1716 (from Rest of World). If you have any questions please visit http://www.researchandmarkets.com/contact/ Order Information Please verify that the product information is correct. Product Name: Web Address: Office Code: Fundamentals of Energy Infrastructure Security: Risk Mitigation in the International Environment http://www.researchandmarkets.com/reports/306049/ SC Product Format Please select the product format and quantity you require: Quantity Hard Copy: USD 2515 + USD 56 Shipping/Handling * Shipping/Handling is only charged once per order. Contact Information Please enter all the information below in BLOCK CAPITALS Title: Mr Mrs Dr Miss Ms Prof First Name: Last Name: Email Address: * Job Title: Organisation: Address: City: Postal / Zip Code: Country: Phone Number: Fax Number: * Please refrain from using free email accounts when ordering (e.g. Yahoo, Hotmail, AOL)
Page 2 of 2 Payment Information Please indicate the payment method you would like to use by selecting the appropriate box. Pay by credit card: You will receive an email with a link to a secure webpage to enter your credit card details. Pay by check: Please post the check, accompanied by this form, to: Research and Markets, Guinness Center, Taylors Lane, Dublin 8, Ireland. Pay by wire transfer: Please transfer funds to: Account number 833 130 83 Sort code 98-53-30 Swift code IBAN number Bank Address ULSBIE2D IE78ULSB98533083313083 Ulster Bank, 27-35 Main Street, Blackrock, Co. Dublin, Ireland. If you have a Marketing Code please enter it below: Marketing Code: Please note that by ordering from Research and Markets you are agreeing to our Terms and Conditions at http://www.researchandmarkets.com/info/terms.asp Please fax this form to: (646) 607-1907 or (646) 964-6609 - From USA +353-1-481-1716 or +353-1-653-1571 - From Rest of World