1 / 22

Safeguarding Employees Against Man-Made Disasters

Safeguarding Employees Against Man-Made Disasters. Webcast & Satellite Training Series August 26, 2005. Brought to you in partnership with:. Panelists. Bob Hart, President, The Innovation Groups (Moderator) Gerry Hoetmer, Executive Director, Public Entity Risk Institute

blois
Télécharger la présentation

Safeguarding Employees Against Man-Made Disasters

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Safeguarding Employees Against Man-Made Disasters Webcast & Satellite Training SeriesAugust 26, 2005 Brought to you in partnership with:

  2. Panelists • Bob Hart, President, The Innovation Groups (Moderator) • Gerry Hoetmer, Executive Director, Public Entity Risk Institute • Lt. William Harding, WMD Expert, Clearwater, FL Police Department • Lt. John Kost, Homeland Security Unit, Sarasota County, FL Sheriff’s Office • Dave Vago, P.E. Operations Services Manager, Wade Trim Engineering

  3. Terrorism We tend to think of terrorism in terms of large, global events that occur in large cities and impact visible landmarks. But terrorism can and often does happen in smaller settings and involves fewer people than a WTC type event.

  4. Six Signs of Terrorism • Surveillance • Elicitation • Testing Security • Acquiring Supplies • Conducting Dry Runs • Deploying Assets or Getting Into Position Source: Michigan State Police

  5. 1. Surveillance • Objective is to determine strengths and weaknesses as well as response times. • Methods • Recording or Monitoring Activities • Drawing Diagrams • Making notes or Maps • Using Vision Enhancing Devices • Possessing Floor Plans or Blueprints • DETECTION – Look for any suspicious people or people who don’t belong.

  6. 2. Elicitation • Objective is to get those with potential inside information about critical elements (i.e. power supplies, water supplies, HVAC) to reveal it. • Methods • Fax • Phone • Questioning personnel • Mail in requests • DETECTION– Who is seeking information & why?

  7. 3. Testing Security • Objective is to determine the veracity of the security force to challenging entry by strangers. • Methods • Use main entrances • Walk or Drive into secured areas and observe response • Attempts to “hack in” • DETECTION – Look for any suspicious people or people who don’t belong.

  8. 4. Acquiring Supplies • Objective is twofold: • To acquire the necessary supplies to perpetrate the attack • To acquire the necessary gear (uniforms, badges, I.D. Cards, decals) to blend into the environment (and thus become invisible). • Methods • Purchase (including black market) • Steal • DETECTION– Anything missing?

  9. 5. Conducting Dry Runs • Objective is to move people and equipment into place – without deploying – to further test response. • Methods • Test traffic patterns into and out from site • Move equipment into secured areas and over selected routes • Coordinate movement • DETECTION – Don’t catch it now then step 6 is GOING TO happen.

  10. 6. Deploying Assets • Objective is to perpetrate the attack • Methods – Essentially the same as the dry run but in real-time with implements of destruction • DETECTION – Notification – How smart is your building?

  11. Move to Response/Recovery • Emergency Response Plan – Well thought out. Drilled response • Rescue Teams – Move victims to safety • Detection – External versus Internal • Tactical Response – Take out the terrorists

  12. What Are Specific Threads? • Improvised Explosive Device (Bombing) • Chemical Agents • Biological Agents • Radiological Agents • Arson/Incendiary Attack • Armed Attack • Nuclear Attack • Unauthorized Entry

  13. RISK ASSESSMENT METHODOLOGY (RAM SM)

  14. RISK ASSESSMENT METHODOLOGY (RAM SM) • Developed by SANDIA Labs in conjunction with the U.S. Government and various professional agencies.

  15. RISK ASSESSMENT METHODOLOGY (RAM SM) • Provides a systematic approach to the assessment of risk by looking at the dangers that are faced and the protections in place – Common Sense Mitigation.

  16. The Risk Equation R = PA * (1 – PE) * C Risk Ranges from 0.1 (minor disruption) to 0.9 (loss of life, etc.) Ranges from 0.0 to 1.0, but use 1.0 Ranges from 0.1 (Total Destruction Likely) to 0.9 (virtually Certain to survive)

  17. RISK ASSESSMENT METHODOLOGY (RAM SM) • Characterization of the facility 2. Determination of critical assets that might be subject to malevolent acts 3. Threat Analysis – Identification and Prioritization of adverse consequences

  18. RISK ASSESSMENT METHODOLOGY (RAM SM) 4. Assessment of the likelihood (qualitative probability) of such malevolent acts 5. Evaluation of existing countermeasures 6. Analysis of current risk 7. Prioritized plan for risk reduction

  19. Questions?

  20. Up Coming Events Don’t miss out! • Jan 27, 2006 - Maximizing The Value Of Your Assets • FREE!* March 24, 2006 - Performance Measures in Government • April 26, 2006 - Deriving Benefits For Your Stake Holder Using The Balance Scorecards

More Related