Letters, Power Lines, and Other Dangerous Things The Politics of Infrastructure Security
An examination of how post-9/11 security concerns have transformed the public view and governance of infrastructure. After September 11, 2001, infrastructures-the mundane systems that undergird much of modern life-were suddenly considered "soft targets" that required immediate security enh...
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Cambridge
The MIT Press
2020
|
Series: | Infrastructures
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_78580 | ||
005 | 20220221 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20220221s2020 xx |||||o ||| 0|eng d | ||
020 | |a mitpress/10541.001.0001 | ||
020 | |a 9780262357777 | ||
020 | |a 9780262538541 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7551/mitpress/10541.001.0001 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a KCS |2 bicssc | |
072 | 7 | |a RNFY |2 bicssc | |
100 | 1 | |a Ellis, Ryan |4 auth | |
245 | 1 | 0 | |a Letters, Power Lines, and Other Dangerous Things |b The Politics of Infrastructure Security |
260 | |a Cambridge |b The MIT Press |c 2020 | ||
300 | |a 1 electronic resource (384 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Infrastructures | |
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a An examination of how post-9/11 security concerns have transformed the public view and governance of infrastructure. After September 11, 2001, infrastructures-the mundane systems that undergird much of modern life-were suddenly considered "soft targets" that required immediate security enhancements. Infrastructure protection quickly became the multibillion dollar core of a new and expansive homeland security mission. In this book, Ryan Ellis examines how the long shadow of post-9/11 security concerns have remade and reordered infrastructure, arguing that it has been a stunning transformation. Ellis describes the way workers, civic groups, city councils, bureaucrats, and others used the threat of terrorism as a political resource, taking the opportunity not only to address security vulnerabilities but also to reassert a degree of public control over infrastructure. Nearly two decades after September 11, the threat of terrorism remains etched into the inner workings of infrastructures through new laws, regulations, technologies, and practices. Ellis maps these changes through an examination of three U.S. infrastructures: the postal system, the freight rail network, and the electric power grid. He describes, for example, how debates about protecting the mail from anthrax and other biological hazards spiraled into larger arguments over worker rights, the power of large-volume mailers, and the fortunes of old media in a new media world; how environmental activists leveraged post-9/11 security fears over shipments of hazardous materials to take on the rail industry and the chemical lobby; and how otherwise marginal federal regulators parlayed new mandatory cybersecurity standards for the electric power industry into a robust system of accountability. | ||
540 | |a Creative Commons |f by-nc-nd/4.0 |2 cc |4 http://creativecommons.org/licenses/by-nc-nd/4.0 | ||
546 | |a English | ||
650 | 7 | |a Economic systems & structures |2 bicssc | |
650 | 7 | |a Energy resources |2 bicssc | |
653 | |a Infrastructure | ||
653 | |a security | ||
653 | |a vulnerability | ||
653 | |a risk | ||
653 | |a politics | ||
653 | |a risk assessment | ||
653 | |a 911 | ||
653 | |a deregulation | ||
653 | |a cybersecurity | ||
653 | |a power lines | ||
653 | |a electric grid | ||
653 | |a USPS | ||
653 | |a mail | ||
653 | |a anthrax | ||
653 | |a transportation networks | ||
653 | |a homeland security | ||
653 | |a critical infrastructure | ||
653 | |a TSA | ||
653 | |a regulation | ||
653 | |a detection | ||
653 | |a securitization | ||
856 | 4 | 0 | |a www.oapen.org |u https://doi.org/10.7551/mitpress/10541.001.0001 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/78580 |7 0 |z DOAB: description of the publication |