The Science and Practice of Resilience Igor Linkov instant download
The Science and Practice of Resilience Igor Linkov instant download
Linkov download
https://textbookfull.com/product/the-science-and-practice-of-
resilience-igor-linkov/
https://textbookfull.com/product/active-interrogation-in-nuclear-
security-science-technology-and-systems-igor-jovanovic/
https://textbookfull.com/product/power-systems-resilience-
modeling-analysis-and-practice-naser-mahdavi-tabatabaei/
https://textbookfull.com/product/remington-the-science-and-
practice-of-pharmacy-remington-the-science-and-practiice-of-
pharmacy-23rd-edition-adeboye-adejare/
https://textbookfull.com/product/the-rise-of-big-spatial-data-
igor-ivan/
Infrastructure Development : Theory, Practice and
Policy: Sustainability and Resilience 1st Edition
Rachna Gangwar
https://textbookfull.com/product/infrastructure-development-
theory-practice-and-policy-sustainability-and-resilience-1st-
edition-rachna-gangwar/
https://textbookfull.com/product/resilience-of-large-water-
management-infrastructure-solutions-from-modern-atmospheric-
science-faisal-hossain/
https://textbookfull.com/product/exploring-resilience-a-
scientific-journey-from-practice-to-theory-siri-wiig/
https://textbookfull.com/product/the-science-and-practice-of-
lithium-therapy-1st-edition-gin-s-malhi/
https://textbookfull.com/product/ethics-and-the-practice-of-
forensic-science-2nd-edition-robin-t-bowen/
Risk, Systems and Decisions
Igor Linkov
Benjamin D. Trump
The Science
and Practice
of Resilience
Risk, Systems and Decisions
Series Editors
Igor Linkov
Engineer Research and Development Center
US Army Corps of Engineers, Concord, MA, USA
Jeffrey Keisler
University of Massachusetts
Boston, Massachusetts, USA
James H. Lambert
University of Virginia
Charlottesville, Virginia, USA
Jose Figueira
University of Lisbon, Lisbon, Portugal
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Foreword
Our world is experiencing critical challenges that affect our everyday life. Severe
weather, digital hacking, and infrastructural failure represent just a few of such chal-
lenges where a disruption can trigger significant and lasting consequences for stake-
holders ranging from local communities to national and international organizations.
Even more troublesome is the increasing complexity and range of consequences
that these threats produce, including a “butterfly effect” where disruption to one
system such as an energy grid can have widespread and disastrous consequences to
many others dependent on that resource. These threats, and their impact upon the
increasing complexity of our everyday systems, will continue to challenge policy-
makers and decision-makers to think of more creative and innovative concepts.
Thankfully, our experience and ability to develop innovative concepts will help
scientists and policymakers meet the challenges of tomorrow. One of these concepts
includes the philosophy and practice of resilience, which emphasizes the capacity
of our infrastructural, digital, social, environmental, and human systems to recover
from disruptions. As the 53rd Chief of Engineers of the United States Army and the
Commanding General of the US Army Corps of Engineers (USACE, 2012–2016),
resilience was an important philosophy and a practice we sought to apply to various
initiatives within the USACE. In this drive to emphasize the concept of resilience, it
was important to articulate the need to apply a “systems thinking” approach to com-
plex environments such as watersheds, coastal infrastructure, and storm preparation
and response. Such a systems-thinking approach included within an overall focus
on resilience will better empower our communities to understand and address the
increasingly complex challenges of tomorrow.
This book authored by Dr. Igor Linkov and Dr. Benjamin Trump includes a com-
pendium of research on the subject of resilience, including several projects executed
by the US Army Engineer Research and Development Center’s Risk and Decision
Science Team. Herein, the authors articulate a clear divide between the past focus
on “risk management” and “resilience thinking.” This “risk management” approach,
while helpful in many contexts with well-established and well-researched threat
scenarios, does not necessarily address the need to enable systems to recover from
disruption. Such disruption can arise in various ways, such as low-probability and
v
vi Foreword
Thomas P. Bostick
53rd Chief of Engineers of the United States Army
Commanding General, U.S. Army Corps of Engineers
Washington, DC, USA
Acknowledgment and Dedication
This book could not have happened without the deep support from our many col-
leagues and friends. This acknowledgment does not do justice to your friendship
and contributions to the field of resilience and risk.
Many individuals have inspired our approach on resilience. We would like to
thank Dr. Jeffrey Keisler (University of Massachusetts, Boston), Dr. James Lambert
(University of Virginia), Dr. Thomas Seager (Arizona State University), and Dr.
José Palma-Oliveira (University of Lisbon), who are great friends and trusted col-
leagues related to resilience theory and practice. Related to network science, we
would like to thank Dr. Maksim Kitsak (Northeastern University), Dr. Shlomo
Havlin (Bar-Ilan University, Israel), Dr. H. Eugene Stanley (Boston University), and
Dr. Alessandro Vespignani (Northeastern University). For their guidance and exper-
tise on resilience as a property of a system, we would like to thank Dr. Craig Allen
(University of Nebraska-Lincoln), Dr. Jesse Keenan (Harvard University), Dr. Scott
Greer (University of Michigan), Dr. David Alderson (Naval Postgraduate School),
and Dr. Stephen Flynn (Northeastern University).
Special thanks are due to past and current members of the Risk and Decision
Science Team at the US Army Corps of Engineers who contributed to developing
many ideas presented here. Catherine Fox-Lent was tireless in her scholarly and
professional work as a civil and environmental engineer and inspired much of the
work herein. Dr. Alexander Ganin provided leadership in developing simulations
and case studies in network science applications to resilience. We also are very
thankful for the scholarly assistance from Dr. Matthew Wood, Dr. Matthew Bates,
Valerie Zemba, Dr. Avi Mersky, Margaret Kurth, Dr. Zachary Collier, Emily Wells,
Dr. Daniel Eisenberg, Dr. Emanuele Massaro, and Joshua Trump. Additional thanks
are due to George Siharulidze, who translated our whiteboard images into beautiful
designs and figures published throughout the book.
We are thankful for the leadership of Drs. Beth Fleming and Ilker Adiguzel
(Laboratory Directors, Environmental Lab, US Army Engineer Research and
Development Center) who allowed us to explore this new and unknown area. We
also acknowledge the unprecedented leadership of LTG (ret.) Thomas Bostick,
Ph.D., 53rd Chief of Engineers of the US Army Corps of Engineers, who has done
vii
viii Acknowledgment and Dedication
ix
x Contents
Index������������������������������������������������������������������������������������������������������������������ 203
About the Authors
Igor Linkov is the Risk and Decision Science Focus Area Lead with the US Army
Engineer Research and Development Center and Adjunct Professor with Carnegie
Mellon University. Dr. Linkov has managed multiple risk and resilience assess-
ments and management projects in many application domains, including cybersecu-
rity, transportation, supply chain, homeland security and defense, and critical
infrastructure. He was part of several interagency committees and working groups
tasked with developing resilience metrics and resilience management approaches,
including the US Army Corps of Engineers Resilience Roadmap. Dr. Linkov has
organized more than 30 national and international conferences and continuing edu-
cation workshops, including NATO workshops on Cyber Resilience in Estonia
(2018) and Finland (2019), as well as chaired program committee for 2015 and
2019 World Congresses on Risk in Singapore and Cape Town. He has published
widely on environmental policy, environmental modeling, and risk analysis, includ-
ing 20 books and over 350 peer-reviewed papers and book chapters in top journals,
like Nature, Nature Nanotechnology, and Nature Climate Change, among others.
He has served on many review and advisory panels for DOD, DHS, FDA, EPA,
NSF, EU, and other US and international agencies. Dr. Linkov is Society for Risk
Analysis Fellow and recipient of 2005 Chauncey Starr Award for exceptional con-
tribution to Risk Analysis as well as 2014 Outstanding Practitioner Award. He is
Elected Fellow with the American Association for the Advancement of Science
(AAAS). Dr. Linkov has a B.S. and M.Sc. in Physics and Mathematics (Polytechnic
Institute) and a Ph.D. in Environmental, Occupational, and Radiation Health
(University of Pittsburgh). He completed his postdoctoral training in Risk
Assessment at Harvard University.
xiii
xiv About the Authors
focusing on recovery from losses after a shock has occurred. However, the National
Academy (2012) and many others define resilience as “the ability to anticipate,
prepare for, and adapt to changing conditions and withstand, respond to, and recover
rapidly from disruptions.” In this definition, adapt and recover are resilience con-
cepts, while withstand and respond to are risk concepts, thus risk component is
clearly added to the definition of resilience. Further, approaches to risk and resil-
ience quantification differ. Risk assessment quantifies the likelihood and conse-
quences of an event to identify critical components of a system vulnerable to specific
threat, and to harden them to avoid losses. In contrast, resilience-based methods
adopt a “threat agnostic” viewpoint.
We understand resilience as the property of a system and a network, where it is
imperative for systems planners to understand the complex and interconnected
nature within which most individuals, organizations, and activities operate. Risk-
based approaches can be helpful to understand how specific threats have an impact
upon a system, yet often lack the necessary characteristic of reviewing how linkages
and nested relationships with other systems leave one vulnerable to cascading fail-
ure and systemic threat. Resilience-based approaches, which inherently review how
the structure and activities of systems influence one another, serves as an avenue to
understand and even quantify a web of complex interconnected networks and their
potential for disruption via cascading systemic threat. Such an approach is one of
increasing prominence and focus on the international level, where the need to better
protect complex systems from systemic threat becomes a matter not only of whether
a system can survive disruption, but importantly in what state would it exist within
the aftermath of such a disruption.
There are at least two important obstacles that have inhibited progress in resil-
ience measurement for complex systems. The first of these is the success of quanti-
tative risk assessment as the dominant paradigm for system design and management.
In infrastructure and disaster management, pervasive concepts of risk have
encroached upon the understanding of resilience. However, resilience has a broader
purview than risk and is essential when risk is incomputable, such as when hazard-
ous conditions are a complete surprise or when the risk analytic paradigm has been
proven ineffective. Therefore, resilience measurement must be advanced with novel
analytic approaches that are complementary to, but readily distinguishable from,
those already identified with risk analysis.
The second of these obstacles is the fragmentation of resilience knowledge into
separate disciplines, including engineering infrastructure, environmental manage-
ment, and cybersecurity. This balkanized approach will inevitably fail to meet
national resilience goals to manage “all hazards” by supporting only incremental
changes to known risks. Such an ambitious policy objective requires a generalizable
approach that is both applicable to a diverse array of systems and revealing of their
interconnectivity.
Despite the promise of resilience analysis to aid the improvement the safety and
security of the variety of industries mentioned, the field remains relatively new to
the risk management industry. One recurring complication is the lack of standard-
1 Risk and Resilience: Similarities and Differences 5
Overall, such discussion will help begin the standardization process that resil-
ience needs in order to improve as a broader assessment framework and will help
incorporate such methods into the risk manager’s toolbox. It is our hope that readers
will gain an understanding of how traditional risk and novel resilience are symbiotic
rather than methodologically at odds with one another, where the user could choose
one or the other based upon the needs of a given situation. With this in mind, we
contend that resilience analysis symbolizes the future of high stakes systems-level
risk management for a variety of disciplines and industries across the world, where
resilience thinking is required for stakeholders to circumvent and actively prepare
for global existential events with the capability of drastically impacting the existing
environment. While no approach or framework is perfect in the grip of uncertainty,
resilience analysis allows its users to position themselves to recover from what oth-
erwise would be a crippling blow to existing capabilities.
Chapter 2
Resilience as Function of Space and Time
Stages of Resilience
area, yet the National Academy of Sciences’ 2012 report on Disaster Resilience
describes resilience as how a system plans and prepares for, withstands and absorbs,
recovers from, and adapts to various disruptions and threats (Fig. 2.2) (NAS 2012).
In this approach, system resilience is an ever-changing activity whereby a system’s
core functions are constantly shifting to deal with threats.
Most conventional, risk-based approaches emphasize the plan/prepare and with-
stand/absorb phases to identify, assess, and prevent/mitigate threat (Linkov et al.
2018a, b, c). Regardless of whether a specific threat is considered, these stages focus
upon (a) identifying and interpreting signals associated with threats to a system, (b)
exploring the structure and connections that a system has with others, and (c) iden-
tifying strategies that preserve a system’s core capacity to function regardless of the
disruption that occurs (Patriarca et al. 2018; Park et al. 2013). Signals include statis-
tics and other information that might indicate a pending systemic threat, i.e., early
reports of new and virulent disease as an indicator of a pending epidemic and public
health crisis (Scheffer et al. 2012). Signal detection is a difficult and recurring task,
but can be the only avenue to better understand the variety of systemic threats that
may arise at different points in the future. Likewise, mapping of the various connec-
tions and dependencies within one’s system can help identify critical functions that,
if taken offline, could generate cascading systemic failure.
If possible, system preparation and absorption of threat is accomplished via a pre-
vention-based approach where a threat is avoided altogether. However, when this is
not possible, emphasis is placed upon the capacity of a normatively beneficial system
to avoid total collapse. This can be accomplished by “graceful degradation,” where
the core operations of a system are prioritized over non-essential services for as long
as possible. By limiting the extent and scope of disruption to a system, it becomes
easier to keep system functions online. Often, this is accomplished by “hardening”
different functions of a system so that they will not break under pressure.
12 2 Resilience as Function of Space and Time
While the plan/prepare and absorb/withstand stages are important to help a sys-
tem address systemic threats before they occur and as they arise, resilience
approaches also must place importance upon how a system performs after the threat
has arrived. This includes (1) recovery and (2) adaptation. Recovery includes all
efforts to regain lost system function as quickly, cheaply, and efficiently as possible,
while adaptation centers upon the capacity of a system to change and better deal
with future threats of a similar nature. Recovery and adaptation serve as the particu-
larly novel additions by resilience to the broader fields of risk analysis, assessment,
and management, and force stakeholders to account for percolation effects due to
disruptions. The role of adaptation and recovery is discussed throughout this book
as a primary point of focus for any resilience analyst, where a system with a robust
capacity for recovery can efficiently weather serious disruptions that would other-
wise break even the most hardened of system components.
Domains of Resilience
Outside of the NAS’ stages of resilience, the spatial component of resilience requires
one to consider how a disruption to one system can trigger consequences in oth-
ers—including those that have indirect or inapparent linkages to the disrupted
system.
Alberts and Hayes (2003) identify four different Network-Centric Operation
(NCO) domains important to a system’s agility, or what Alberts later defines as
“the ability to successfully effect, cope with, and/or exploit changes in circum-
stances” (Alberts and Hayes 2006). While early in scope, this effort at resilience
thinking is intended to force its users to consider the wide breadth of characteris-
tics and decision inputs that may factor into system performance. Each domain is
impacted in a different yet equally important manner when a critical or disruptive
event arises, and success in one domain may not guarantee the same outcome in
other areas. Additionally, it is important to note that the greatest resilience and the
ability to recover from adverse events is achievable only when all domains are
considered and resolved in a resilience analysis policy problem. These domains
include (Hayes 2004; Alberts 2007):
1. Physical: sensors, facilities, equipment, system states, and capabilities
2. Information: creation, manipulation, and storage of data
3. Cognitive: understanding, mental models, preconceptions, biases, and values
4. Social: interaction, collaboration and self-synchronization between individuals
and entities
These domains are important to decision-making for complex systems in general
and resilience in particular (Roege et al. 2014; Collier and Linkov 2014). The physi-
cal domain represents where the event and responses occur across the environment
and is typically the most obviously compromised system in the midst and aftermath
of an external shock or critical risk event. Elements here can include infrastructural
Domains of Resilience 13
The social domain represents interactions between and within entities involved.
The social domain also provides an area to which careful attention should be paid in
overall community resilience. Social aspects of society have impacts on physical
health (Ebi and Semenza 2008). For example, individuals or communities can have
better recovery in the face of epidemic when they also have strong social support and
social cohesion. The social domain also ties into the information domain in regard to
trust in information. When the community does not trust the source of information,
they often do not trust the information or have to take the time to verify it, leading to
a need for community engagement by the authority or organization to increase their
social relations and therefore trust within the community (Longstaff 2005).
While the physical and cognitive domains gain a lot of attention in both overall
resilience and hazard-specific resilience, the information domain is of great impor-
tance for overall functioning. In more than just health events, information has a
huge impact on citizen response (Crouse Quinn 2008). Not all individuals under-
stand and interpret information the same way. This leads to a need for attention to
be paid on how to get information out effectively and in a timely fashion during a
crisis. Information is important to more than just the citizens, however. Adequate
information is crucial in real time for authorities to make informed and appropriate
decisions (Hsu and Sandford 2010). As important as information is, however, it is
equally important to account for the role of human decision-making. Specifically,
human interpretation of data is important as raw numbers can be misleading if not
considered in context of a given environmental setting or policy application. This
ties back into needing to disperse tailored information for understanding that places
data pertinent to a threat in a manner that is not convoluted for its recipient. How
authorities and citizens handle information should be evaluated with careful consid-
eration for the communities being discussed.
Social resilience within this context may apply to societies and communities of
various size, ranging from local neighborhoods and towns to more regional or
national governments. For smaller communities, organizations, and businesses, dis-
cussions of resilience may center on the ability of local governments and set com-
munities to address long-term concerns such as with the impact of climate change
(Berkes and Jolly 2002; Karvetski et al. 2011), ecological disasters (Adger et al.
2005; Cross 2001), earthquakes (Bruneau et al. 2003), and cybersecurity concerns
(Williams and Manheke 2010), as well as other man-made hazards such as transna-
tional wars, civil wars, terrorism, migration, and industrial hazards. For larger
communities and governments, such concerns are similar yet often more complex
and varied in nature, where they involve hundreds to potentially thousands of stake-
holders and include the interaction of various infrastructural systems.
These domains often overlap and exist in all systems, such as for messages from the
information domain to be shared, infrastructure in the physical domain or interactions
in the social domain must support dissemination. At its core, a focus upon domains
ensures that a policymaker or risk manager acquires a holistic understanding of their
policy realm, and is able to understand how a shock or stress could trigger cascading
consequences that were previously difficult to comprehend. For example, the collapse
of Lehman Brothers triggered a worldwide economic recession in 2008 due to the
inherent interconnectivity of various economic and financial systems at that time.
Domains of Resilience 15
Resilience as a formal method and disciplinary practices lacks the rich and exten-
sive history as complementary practices of risk analysis. Despite the lack of any
formal definition or methodological practice, the role of resilience in economic,
infrastructural, environmental, and social policy is a topic of growing interest and
equally rising uncertainty. Though it is ultimately the responsibility for high-level
policymakers and other key stakeholders to define and scope the practice of resil-
ience, this book offers one view that frames resilience as a differing yet complemen-
tary process to conventional risk assessment and management.
Risk analysis has decades of history as a collection of tools dedicated to espous-
ing and managing risk—generally through some synthesis of the threat in question,
the vulnerability of a system to that threat, and the consequences should the threat
arise. In this way, risk-based assessment and management approaches emphasize
the capacity of a system to absorb and withstand specific threats. Such an approach
is battle tested in various application areas and performs admirably in situations of
high clarity and robust opportunities to acquire data related to situational risk.
For government projects and interests, risk analysis, including risk assessment
and management, involves the systematic review of various infrastructural, environ-
mental, and organizational factors to identify potential areas where risk could arise
(National Research Council 1983; Linkov et al. 2005). This exercise has multiple
purposes, including (1) to identify and understand those areas where a certain haz-
ard is most likely to arise, (2) to gauge some value of the likelihood of this negative
event from occurring, (3) to understand the consequences if this risk would actually
occur, and (4) to provide some alternative policies or actions that could mitigate or
prevent such a scenario. Different tools provide a qualitative and/or quantitative
algorithm that addresses these needs, ranging from an unstructured ad hoc qualitative
panel discussion to a fully quantitative and reductive decision model to assess
expected losses in the form of financial, infrastructural, or human casualties.
In such an environment, the outcome of a risk is both uncertain and meaningful
to the relevant stakeholder. Risk presents the potential for both direct (i.e., human
health hazard) and indirect loss (reduction in reputation), and retains an element of
unpredictability that makes many risks difficult to fully prepare for over any time
frame or even to predict the full vector of risks that may arise. An additional concern
is the availability of resources to protect against risks, where policymakers are
required to conduct resource maximization exercises to best prepare various assets
for a universe of future risk events with limited annual budgets. Ultimately, this
means that the potential for some future hazard must be tolerated due to a lack of
resources or general inability to resolve the weakness that permits a negative out-
come. By and large, risk assessment exercises require the prevention and mitigation
of the most consequential and likely risk firsts, where more minor externalities and
very low-probability, high consequence events are, respectively, given less empha-
sis for risk preparation and mitigation. Of course, this exercise is at the discretion of
16 2 Resilience as Function of Space and Time
the stakeholder, where stakeholders and key decision-makers will have to decide
how to optimize limited funds and available manpower to achieve the greatest risk
preparation possible.
Along with considerations of outcomes, uncertainty, and overall risk tolerance,
stakeholders and policymakers are required to consider the passage of time. While
predicting what will happen tomorrow is already an inaccurate science, accounting
for risk over the course of years or decades can quickly become an impractical task
without some mechanism for decision support. Such an exercise includes the assess-
ment of an assortment of political, social, and industrial preferences. Shifting soci-
etal preferences alongside the degradation of infrastructure 5, 10, 20, or more years
into the future only increases the uncertainty of the hazards posed by external
shocks to environmental, industrial, commercial, and cyber systems. Conventional
risk assessment attempts to account for these issues by advising for protection
against the most egregious and harmful hazards over the extended term. However,
the recommendations given are generally the reflection of an intransigent system
with fixed preferences, and may not provide a clear or optimal path to recover from
serious adverse events that may dramatically alter or damage a given system.
Ultimately, most applications of risk analysis focus upon system preservation
based upon its capacity to prevent or mitigate risk by withstanding and absorbing a
specific threat or a collection of threats. This conclusion is generally a logical one—
we tend to want to prioritize our resources to address the problems that we know we
have—particularly those in the near future. While such an approach addresses many
of the challenges facing most individuals and organizations today, risk-based
approaches that emphasize withstanding or absorbing specific threats to specific
systems are less effective at addressing problems of high complexity or high uncer-
tainty. Simply put—a differing approach is likely needed to address subjects with
greater uncertainty, be they “known unknowns” or even “unknown unknowns.”
Resilience analysis fundamentally maintains much of the same philosophical
background as traditional risk assessment, but resilience analysis additionally
delves into the unknown. Resilience thinking requires its practitioners to ponder
potential future threats to system stability and develop countermeasures or safe-
guards to prevent longstanding losses, not just direct losses from historical threats.
Resilience analysis maintains one primary difference in its focus on outcomes,
where practitioners are directly concerned for the ability of the impacted organiza-
tion, infrastructure, or environment to rebound from its external shock. In other
words, where traditional risk assessment methods seek to mitigate and manage haz-
ards based upon a snapshot in time, resilience analysis instead seeks support system
flexibility and ultimately offers a “soft landing” for the organization or structure at
hand (Fig. 2.3). Simply put, resilience analysis is the systematic process to ensure
that a significant external shock—e.g., climate change to the environment, hackers
to cybersecurity, or a virulent disease to population health—does not exhibit lasting
damage to the efficiency and functionality of a given system. This elegant philo-
sophical difference is complex yet necessary to meet the growing challenges and
uncertainties of an increasingly global and interconnected world.
A Brief Note on the Omnipresence of Uncertainty 17
This section will include both an introductory review of resilience analysis and
how it compares and contrasts with existing risk analysis and management tools. In
discussing the calls for resilience analysis, we will consider the activities and needs
of individual US government agencies. Next, we will discuss those shortcomings in
conventional risk analysis methods that could be filled by resilience analysis, along
with any existing impediments or resistance to adopting this growing methodology.
As such, this chapter will provide the groundwork to understand the benefits of
resilience analysis in the risk management toolbox alongside those stakeholders
who have already called for its development and use.
This chapter has already touched on a key ingredient of any risk calculation—
uncertainty. Regardless of how familiar a situation or condition seems, from driving
a car on a familiar road to purchasing food at a local grocery store, a certain degree
of uncertainty exists regarding the potential for success or injury for a given activity.
It plagues individual and systemic activities alike, injecting the possibility of nega-
tive outcomes (however slight) that may arise in the midst of certain actions or
behaviors. In a general sense, uncertainty is omnipresent in all elements of daily
life, with individuals and systems making either deliberate or subconscious
18 2 Resilience as Function of Space and Time
Original Size
Suffolk instantly got behind Monteagle, who stood trembling with
fear, when the phantom cask assumed the form of a "tall, desperate
fellow," who proved to be Fawkes, and the Chamberlain, affecting a
careless indifference, demanded his "name, birth, and parentage."
Guido handed his card, bearing the words G. Fawkes, and
announced himself as the servant of Mr. Percy, who carried on a
trade in coals, coke, and wood, if he could, in the immediate
neighbourhood. "Indeed," said Suffolk, "your master has a tolerably
large stock on hand, though I think there is something else screened
besides the coals, which I see around me." Without adding another
word, he and Monteagle ran off, and Fawkes hastened to acquaint
Percy with what had happened.
Poor Guido seems to have formed a most feline and most fatal
attachment to the place, for nothing could keep him out of the cellar,
though he knew he was almost certain of being hauled
unceremoniously over the coals, and he went back at two in the
morning to the old spot, with his habitual foolhardiness. He had no
sooner opened the door than he was seized and pinioned, without
his opinion being asked, by a party of soldiers. He made one
desperate effort to make light of the whole business, by setting fire
to the train, but he had no box of Congreves at hand, and he
observed, with bitter boldness, in continuation of a pun which he
had made in happier days, that he had at last found his match and
lost his Lucifer. Poor Guy Fawkes, having been bound hand and foot,
was taken on a stretcher to Whitehall, having been previously
searched, when his pocket was found filled with tinder, touch-wood,
and other similar rubbish. Behind the door there was a dark
lanthorn, or bull's-eye, that had cowed the soldiers at first glance, by
its glazed look, but it seemed less terrible on their walking resolutely
up to it. Fawkes was taken to the king's bedroom, at Whitehall, and
though his limbs were bound and helpless, he spoke with a thick,
bold, ropy voice that terrified all around him. His tones had become
quite sepulchral, from remaining so long in the vault, and when
asked his name, he scraped out from his hoarse throat the words
"John Johnson," which came gratingly—as if through a grating——on
the ears of the bystanders. He announced himself as John the
footman to Mr. Percy, and he threw himself into an attitude—which
was rather cramped by his pinions—which he found anything but the
sort of pinions that would enable him to soar into the lofty regions of
romance to which he had aspired. He nevertheless boldly announced
his purpose, with the audacity of a stage villain; and with that sort of
magnanimity which lasts, on an average, about five minutes in the
guilty breast, he refused to disclose the names of his accomplices.
One of the Scotch courtiers, who had a natural feeling of
stinginess, asked how it was that Fawkes had collected so many
barrels of gunpowder, when half the quantity would have done.
Upon which Fawkes replied, that his principal had desired him to
purchase enough to blow the Scotch back to Scotland. "Hoot, awa,
mon!" rejoined the Scot; "but ken ye not that ye might have bought
half the powder, and put the rest of the siller in your pocket?"
Fawkes sternly intimated that though he would have blown up the
Parliament, he would not defraud his principal. "Hoot, mon!" cried
the Scotchman, who loved his specie under the pretence of loving
his species, and who, it is probable, belonged to the Chambers;
"Hoot, mon!" he whined, "dinna ye ken that there are times when
you mun just throw your preencipal overboard?" *
* A fact!
Original Size
Rookwood, who had ordered relays of fine horses all along the
road, went at full gallop through Highgate, and never slackened his
pace till he reached Turvey, in Bedfordshire, where he came
tumbling almost topsy-turvy over the inhabitants. Arriving at Ashby,
St. Legers, with a légèrete quite worthy of the race for the St. Leger
itself, he had already travelled eighty miles in six hours; but he
nevertheless pushed along on his gallant steed—a magnificent dun—
who always ran as if he had a commercial dun at his heels, to
Dunchurch. Here he found Digby, enjoying his otium cum dig.—with
a hunting party round him; but the guests guessed what was in the
wind, and fearing they might come in for the blow, had vanished in
the night-time. When Digby sat down to breakfast the next day, his
circle of friends had dwindled to a triangle, consisting of Catesby,
Percy, and Rookwood, who, with their host, now become almost a
host in himself, took speedily to horse, and rode a regular steeple-
chase to the borders of Staffordshire. Here they arrived on the night
of the 7th of November, at Holbeach, where they took possession of
a house; but by this time Sir Richard Walsh, the sheriff of Worcester,
who had got writs out against them all, was close upon them with
his officers.
In the morning their landlord, one Littleton, having been let into
their secret, let himself out of his bedroom window through fear, and
Digby decamped under pretence of going to buy some eggs to suck
for breakfast, as well as to look for some succour. Digby had hardly
shut the street door when its bang was echoed by a bang up stairs,
occasioned by Catesby, Percy, and Rookwood having endeavoured to
dry some gunpowder in a frying pan over the fire. Catesby was burnt
and blackened, besides being blown up for having been the chief
cause of the accident; and shortly afterwards, to add to their
misfortunes, the sheriff, with the posse comitatus, surrounded the
dwelling. The conspirators endeavoured to parry with their swords
the bullets of their assailants, but this was a hopeless job, and
keeping up their spirits as well as they could, they exclaimed at
every shot fired on the side of the king, "Here comes another dose
of James's powder." Catesby, addressing Thomas Winter, roared out,
"Now then, stand by me, Tom!" and Winter, suddenly taking a spring
to his friend's side, they were both shot by one musket. Their
attendants, not being able to get the bullet out, issued a bullet-in to
say they were both dead, and the brothers Wright were not long left
to bewail the fate of their accomplices. Percy, who had persevered to
the last, got a wound which wound him up, and Rookwood had
received such a home-thrust in the stomach from a rusty pike, that
the pike rust sadly disagreed with him. Digby, whose feelings had
run away with him, was overtaken, caught, and made fast, because
he had been too slow, while Keyes came to a dead-lock, and the
prisoners being all brought to London, were lodged in the Tower.
Tresham, who had never left town, but was strutting about with all
the easy confidence of a man with "nothing out against him," was
suddenly nabbed, in spite of his remonstrances, conveyed in
exclamations of "What have I done?"
"La! bless me! there must be some mistake!" and other appeals of
an ejaculatory but useless character.
Poor Guido Fawkes was examined by Popham, Coke, and Wood,
whose names may now for the first time be noticed as appropriate
to the business they were entrusted with. Popham is surely
emblematical of the series of pops, bangs, and explosions that would
have ensued from the Gunpowder Plot; while Coke and Wood are
obviously symbolical of the combustibles required for fuel. In vain
did these sagacious persons attempt to get anything from Guido,
who said "he belonged to the Fawkes and not to the spoons, who
might perhaps be made to convict themselves by cross questioning."
Popham popped questions in abundance; Coke tried to coax out the
truth; and Wood, if he could, would have got at the facts; but
neither threats nor promises could prevent Fawkes from showing his
metal.
Posterity, in altering his name to Guy Fox, has happily hit upon an
appropriately expressed the cunning of his character. He confessed
his own share in the business readily enough, but resolutely refused
to betray his associates. "I will not acknowledge that Percy is in the
plot," he cried; which reminds us of an intimation made by a
gentleman just arrested, to his surrounding friends, that "he did not
wish the bailiff pumped upon." A nod is as good as a wink in certain
cases; and like winking the sheriff's officer was submitted to a
course of hydropathic treatment. In the same manner the
declaration of Fawkes that "Percy had nothing to do with it—oh, dear
no, nothing at all!" was quite enough to put the authorities on the
right scent had any such guidance been required.
Original Size
Original Size
This was on the 6th of January, 1622, when the water was frozen;
and James had just been saying to himself, "I'm glad I have made
the plunge, and broken the ice with these turbulent Commons,"
when he found himself plunging and breaking the ice after another
fashion. Fortunately his boots were buoyant—perhaps they had cork
soles—and Sir Richard Young, seizing a boat-hook, which he
converted for the moment into a boot-hook, drew the sovereign by
the heels from what he afterwards declared was decidedly not his
proper element.
Buckingham, as we have already seen, was the sole successor to
Somerset in the office of royal favourite; but Charles, the Prince of
Wales, had taken rather an aversion than otherwise to the person
whom his father patronised. The friends of the latter were generally
so disreputable, that his son could not go wrong in avoiding them;
but Buckingham beginning to look upon Charles as the better
speculation of the two, resolved on making himself as agreeable as
possible to the more faithful and therefore more promising branch of
royalty. The duke being fond of scampish adventure, proposed a
plan better suited to be made the incident of a farce, than to be
ranked as an event in history. He suggested that Charles and himself
should travel to Spain under the assumed names of Jack Smith and
Tom Smith, in order that the prince might introduce himself to the
Infanta of Spain, whom it had been proposed he should marry. For
such a wild-goose scheme to succeed, an Infanta of Spain must
have been much more accessible in those days than in ours; for
though Jack Smith and Tom Smith might find their way into a public-
house parlour, and make love to the landlord's daughter, they would
assuredly never be allowed to carry their gallantries into any
European palace, or even to obtain admittance into any respectable
private family. James, when the scheme was proposed to him,
discouraged it at first, but being taken by the scapegrace couple in
"a jovial humour," which means when the trio happened to be
disgracefully drunk, the consent of the king was given to the farcical
enterprise.
Having arrived at Madrid, the two hopeful youths rode up on
mules to the door of Sir Thomas Digby, the British ambassador, and
sent in the names of John and Thomas Smith; but Digby, knowing
no less than half a hundred Smiths, declined seeing the "party"
unless a more special description was sent up to him. Without
waiting for further formality, Buckingham—alias Tom Smith—walked
with his portmanteau straight into the ambassador's presence, after
a series of scuffles on the staircase and in the passages,
accompanied by shouts of "Keep back, fellow!"
"You can't come up!" and other exclamations that had prepared
Digby to give Tom Smith a reception by no means encouraging.
When tne ambassador recognised his visitor, his manner completely
changed, and his politeness knew no bounds, when in Jack Smith,
who entered next, Digby saw no less a person than the heir to the
throne of England. The incognito was of course at an end in an
instant, and the next day Buckingham and the prince were
presented to the royal family of Spain, though the farce of the
disguise was still kept up to a certain extent; and the Infanta was
sent out in her father's carriage, "sitting in the boot," says Howell,
"that Charles might get a sight of her." The position of a young lady
looking from the boot of a carriage could not have been very
becoming, and she does not seem to have made a particularly
favourable impression on her intended suitor. He nevertheless
expressed his readiness to have another look at her, and he played
the part of lover at Buckingham's instigation, for the purpose of
getting a variety of presents from the young lady's family.
Her brother Philip was anxious for the match, and did everything
to encourage it, by giving some valuable article to Charles whenever
he evinced anything like affection for the young Infanta. One day he
pretended to be in a particularly tender mood, and at every piece of
gallantry he displayed Philip gave him something costly to take away
with him. By a series of smirks, leers, and pretty speeches, he
secured some original pictures by Titian and Correggio, but when he
rushed up to the Infanta with amorous playfulness, pinking her in
the side with his cane, and giving the Spanish version of "Whew, you
little baggage!" the queen of Spain was so delighted that she
emptied her reticule, which was full of amber, into the pocket of the
Prince, while the word "Halves" was whispered in a sepulchral tone
into his ear by the crafty and avaricious Buckingham.
When they had got all they could out of the Spanish royal family,
the English prince and his companion made up their minds that the
Infanta was a failure, and that they had better get home with all
possible celerity. Buckingham began treating Philip with the most
disrespectful familiarity, slapping him boisterously on the back,
alluding to him curtly, but not courteously, as Phil., ana otherwise
offending the royal dignity. At length Prince Charles and his
companion called to take leave, when the former played his old part
of a devoted lover, beating in the crown of his hat, stamping on the
floor, and giving the numerous signs of devotion that a practice of
several weeks under a popular actor had made him completely
master of. He had no sooner turned his back upon Madrid, and
commenced moving towards home, than he made up his mind to cut
the matrimonial connection; and he announced his determination by
a messenger, who was instructed to say to Philip, that, for the good
of both parties, and decidedly for the happiness of one, the
abandonment of the marriage was much to be desired. Philip, upon
whom the Infanta was a drag he would have been glad to get off his
hands, became angry at the tampering that had taken place with the
young lady's affections; but as these were no doubt pretty tough,
the damage was not material.
A proxy had been left in the hands of Digby, Earl of Bristol, the
British Ambassador at Madrid, and the royal family sent nearly every
day, with their compliments, begging to know when the proxy was to
be acted upon; but finding at last, that, notwithstanding the proxy,
there was no approximation to a satisfactory result, a most
unpleasant feeling was created. Bristol, who was a man of honour,
felt very uncomfortable at the evasive replies he was compelled to
give, and was not sorry to return to England; though he had, as he
naturally observed, "not bargained for the warrant which, in the
most unwarrantable manner, awaited his arrival, and sent him
straight to the Tower." He was soon afterwards released, but was not
allowed by Buckingham, the favourite, to approach the king, and a
recommendation to Bristol to go to Bath, or to retire to his country
seat, was the only reply the ex-ambassador could obtain to his
solicitations to be allowed to offer explanations to his sovereign.
Charles had given the Infanta scarcely time to recover from the
jilting she had just undergone, when, with a cruel disregard of that
young person's feelings, he made up to Mademoiselle Henrietta of
France, and a marriage with the latter was speedily concluded. The
dowry, amounting to about £100,000, was paid partly down, but the
nuptial ceremony was performed by proxy; and the English
Government wrote over to say that there was no hurry about the
bride, provided some of the cash was transmitted to England as
speedily as possible.
With some of the cash thus obtained, and with money squeezed
out of the people, an expensive engagement was formed with Count
Mans-feldt, an adventurer from the Low Countries, who undertook to
recover the Palatinate, if an English army of twelve thousand men
were placed under him. The troops were put at his disposal, and
embarked at Dover; but on reaching Calais the governor had no
orders to let them pass, and in consequence of the loss of the city in
Mary's time, the free list, of which the English had been in the habit
of taking advantage, was of course suspended. In vain did Mansfeldt
inform the door-keeper that it was all right, and insist that the name
of Mansfeldt and party should have been left with the authorities; for
the man resolutely declared he had a duty to perform, which
prevented him from admitting the earl and his followers. While they
were waiting outside the bar of Calais, several of the troops suffered
severely from sea-sickness, and being obliged to go round by the
back way, they had become so attenuated, that instead of being fit
for marching into the Palatinate, they were much better adapted for
marching into Guy's Hospital.
The failure of this expedition was the last event of importance in
the reign of James, who was fast sinking under gout and tertian
ague, produced by a long indulgence in rums, gins, brandies, and
other compounds. He died, at the age of fifty-nine, on the 27th of
March, 1625, having reigned upwards of two-and-twenty years,
during which he showed himself fully deserving of the title bestowed
on him by Sully, who said of James the First that he was the "wisest
fool in Europe." He was learned, it is true, but his acquirements,
such as they were, became a bore, from his disagreeable habit of
thrusting them at most inappropriate times upon all who approached
him. He was weak, mean, and pusillanimous, while his excessive
vanity caused him to select for his companions those pitiful
sycophants who would affect admiration for those miserable
qualities, which, had he cultivated the friendship of honest and
intelligent men, he might have been eventually broken of. He lost,
and indeed he did not desire the society of his children, because
they could not sympathise with those littlenesses of character which,
the older they grew, their judgment caused them more and more to
despise and deplore in their unfortunate parent.
Happily only two out of seven survived to endure that alienation
which must have been painful while it would have been unavoidable;
and they were thus spared the humiliation of seeing a father vain,
selfish, and unrepentant to the last, while their deaths in rapid
succession gave him happily no uneasiness. For his eldest son he
had, as we have already seen, prohibited the wearing of mourning,
thus giving a proof of combined malice and stupidity, since his
insults to the dead were of course as impotent as they were wicked
and infamous. He was suspicious in the extreme, and always fancied
he was going to be done or done for. To guard against the latter
contingency he wore a quilted doublet that was proof against a
stiletto, and under the apprehension of being taken advantage of, he
obstinately excluded every one from his confidence. The result was
that he never had a friend, through his constant dread of an
imaginary enemy. It has been said of him by one of his historians,
that he was fond of laughing at his own conceits; but the wretch
who can even smile at a joke of his own must be such a libel upon
human nature that not even Hume-an(d) Smollett (ha! ha! mark the
pun) shall make us believe that an individual so abject could ever
have existed.
Though the sovereign himself was not calculated to inspire
respect, there were many events in his reign which rendered it
useful if not glorious. Sir Hugh Middleton commenced at Amwell that
now venerable New River, by dabbling in which he swamped himself
and secured a stream of health and prosperity to those who came
after him. The immortal Hicks finished his memorable Hall; Lord
Napier invented logarithms, to the extreme disgust of the school-
boys of every generation; and Dr. Harvey made the magnificent
discovery that the blood is a periodical enjoying the most unlimited
circulation. Two Dutch navigators contrived to double Cape Horn;
which the reader must not imagine was twice its present size before
that operation was performed, for Cape Horn, like any other cape, is
not larger when doubled. Bill Baffin, an Englishman (you all know Bill
Baffin) discovered Baffin's Bay in the year 1616, and a patent for the
fire engine, granted two years afterwards, has been stated as a
proof that steam power was first known in England in 1618, though
upon inquiry we are inclined to think there was more of smoke than
steam in the invention spoken of.
The wealth and extravagance of the nobles, among whom
corruption and bribery were practised "wholesale, retail, and for
exportation," may be imagined from the statement, that on the
marriage of the French king, the horse of the English ambassador
wore silver shoes so loosely fastened on, that they fell off, and were
instantly replaced, for distribution among the populace. We can
scarcely believe that any English horse could have walked in these
silver shoes or slippers in the time of James, however skilfully they
could have substituted sliding for walking, since the Wood Demon,
coming to London, caused the introduction of wooden pavements.
The luxury and display that stand prominently forward among the
characteristics of the period, were discountenanced by James when
seen in others, though he would have spared nothing tor the selfish
gratification of his own extravagance. Bacon, whose tendency to
flattery justifies the popular analogy between butter and bacon,
remarked of the king that he would recommend the country
gentlemen to remain at their seats, by saying to them, "In London
you are like ships in a sea, which show like nothing; but in your
country villages you are like ships in a river, which look like great
things." * This, after all, was a funny idea, but a bad argument; for
a ship in a river, like a storm in a puddle, is somewhat out of its
element. Many would prefer being wrecked in the ocean of a busy
but tempestuous life, to remaining aground in the dismal swamp of
rural obscurity. The thing to be desired, is the art of keeping a
steady course, and steering in the right direction; but it is mere
pusillanimity to accept a recommendation to shirk the voyage.
Among the inventions of the reign of James, we must not omit to
mention the sedan, a contrivance of the lazy and luxurious
Buckingham. On its first appearance in public, the mob hooted the
machine as it passed, declaring that their fellow-creatures should not
do the service of beasts; but the "fellow-creatures," being paid for
and liking the job, were the first to beat off their friends, the people.
The friends of humanity were, however, not content till they had
broken in the top and knocked out the bottom of the machine,
leaving Buckingham to walk home in a most uncomfortable case,
with his head peering out at the top, and his feet appearing at the
bottom of his novel equipage.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com