FERC Security Program for Hydropower Projects

Download Report

Transcript FERC Security Program for Hydropower Projects

Current US Security
Practice for Hydro Facilities
Outline of Presentation
- Responsibilities of FERC and Owners for security
of US hydro projects
- FERC's Security Program for Hydro Projects (copy
sent before – on FERC website – www.ferc.org)
- Owners Security Assessments and Actions
Required by FERC
- Charleston Workshop – March 2003
- Current status – FERC presentation at HV 2004
- Vulnerability Assessment Methodologies - RAM-D,
VA Analysis, DAMS-VR
- Review of Typical Cases
- Key Issues
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Responsibilities for Security at
US Hydropower Projects
 Federal dams
– US Bureau of Reclamation (USBR), US Army Corps of
Engineers, etc.
 Non-federal dams for hydropower
– Federal Energy Regulatory Commission (FERC).
 Other dams
– Association of State Dam Safety Officials (ASDSO).
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
FERC Security Program for
Hydropower Projects
 Program was distributed to licensees/exemptees in
June 2002.
 FERC received comments and recommendations
from licensees and other agencies.
 FERC Issued Revision in November 2002
 All Licensees responded to FERC by September
30, 2003
 Security measures have been implemented
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Owners Security Assessments
Actions Required by FERC
Licensees/exemptees will be responsible for:
• Security at their projects, vulnerability and risk assessments of their
projects (as appropriate), security upgrades, and communicating with
local law enforcement and nearby dam operators.
• Having a single designated contact to receive FERC security alerts.
• Having a designated contact to the FERC for other security related
communications.
• Ensuring that the corporate security officer be involved with all security
associated activities.
• Making sure that security measures do not conflict with License
requirements.
• Integrating the EAP, Security Plan, and Recovery Plan for their projects,
if that project has those documents.
• Communicating to the FERC Dam Safety staff and nearby dam operators
regarding security breaches or incidents, if not expressly restricted by
law enforcement agencies.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Requirements for FERC dams:
Requirement
Group 1
Group 2
Group 3
Security Assessment
Yes (1,4)
Yes (1,4)
No (2)
Vulnerability Assessment
Yes (1,5)
No (2,5)
No (5)
Security Plan
Yes (1)
Yes (1)
No (2)
Integration of Security concerns
and EAP procedures
Yes (3)
Yes (3)
No (2)
1 Completed by September 30, 2003.
2 Although not required, this item is strongly encouraged.
3 Integration should begin immediately, and be revised as conditions change and
documents are refined or developed.
4 A separate Security Assessment may not be required for a dam if a more detailed
Vulnerability Assessment is completed for that facility that addresses the need for security upgrades.
5 A Vulnerability Assessment must be completed prior to the FERC approval of requests
for permanent closures of recreational, or other project, facilities.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Documents Required by FERC
Security Assessment - An evaluation of the current
state and appropriateness of the onsite security
system and what needs to be done at a project or
facility to address concerns regarding security,
such as installation of fences, gates, cameras,
increased guards, etc.
This assessment will identify if any security enhancements
are needed, and specifically what those enhancements
consist of. The recommendations made from the Security
Assessment will lead to improved security measures and
should be incorporated into the corporate Security Plan
(see definitions, below).
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Documents Required by FERC
Vulnerability Assessment (VA) - addresses the following:
1) it identifies the "weak points" or vulnerable project features;
2) it assesses the potential threat to a facility as based on organizations or
people who may wish to cause harm to the facility, a history of security
incidents, and information received from the FBI or other law
enforcement agencies specific to your area or facility;
3) it addresses the consequences of such an attack, and;
4) it addresses the effectiveness of the security system to counter such an
attack. These factors should be addressed with a fair degree of
confidence, with some supportive documentation to substantiate the
assumptions.
VAs must be completed for all Security Group 1 Dams, and for any dams
where there is a request to close usage (i.e., recreation or roads) of
project lands for security reasons.
A Security Assessment may be incorporated within a detailed VA.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Documents Required by FERC
Security Plan - A document that characterizes the response to
security concerns at a project or facility.
The Security Plan may include specific features of the project
security program, such as fences, surveillance cameras, etc.
and company procedures to follow based upon changing
threat conditions or situations.
The Security Plan can be very simple or very complex based
upon the specifics of the site as well as the assessment of
the potential threat to the facility.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Documents Required by FERC
Recovery Plan - A document describing the actions an
organization will take to recover from a disaster. The
disaster can be natural or caused by criminal activity.
A Recovery Plan in this program generally refers to the
pre-planned actions allowing a utility to continue, or
quickly restore, generation of power, or otherwise function
in its intended purpose.
This document is also known as Utility Recovery Plans,
Continuity of Operation Plans, etc. This document can be
specific to a hydropower dam or reservoir, and/or part of
the entire utility company recovery plan.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Documents Required by FERC
Emergency Action Plan (EAP) - A document describing the
actions a dam owner/operator takes if a problem exists at a
dam, whether due to natural causes or sabotage.
Actions include identifying and assessing the problem,
mitigating the problem if possible, and notifying the
emergency management system to protect human life and
property.
Inundation studies and notification call charts are included
in EAPs.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Documents Required by FERC
Integration of plans - In this program, "integration" of plans is defined as
ensuring that there is continuity between the many company
documents that may exist, such as Security Plans and Emergency
Action Plans (EAPs). Emergency and response actions arising from
procedures contained in company documents should be internally
consistent, with few if any procedural conflicts. Authors and
administrators of documents within a company should ensure that
proper coordination has been achieved and, as an example, the security
personnel understand the procedures contained in the EAP and vice
versa.
"Integration" does not mean that security information should be
incorporated into an EAP, which would have a wider distribution than
a Security Plan.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Current Status of FERC Program
Summary of Presentation by
FERC Physical Infrastructure Security Specialist
at
HydroVision 2004
Montreal, Quebec
6th October 2004
August 19, 2004
CESI Security Workshop, Milan
Robin Charlwood
SABOTAGE OF DAMS
A historical perspective…
Mohne:
Breach: 253 x 72 feet
Discharge: 310,000 cfs
Wave: 33 feet high
6th October 2004
Eder:
Breach: 164 feet
Discharge: 300,000 cfs
CESI Security Workshop, Milan
Robin Charlwood
THE CURRENT (11/99) TSWG BLAST CARD
WHAT 1,010 POUNDS OF H.E. DETONATED
IN A SCHOOL BUS LOOKS LIKE
KHOBAR TOWERS – TANKER TRUCK
WITH 15,000 LBS. PLASTIC EXPLOSIVES:
LEFT A CRATER MORE THAN 15 FEET
DEEP
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
RESULTS OF FERC LICENSEE
VULNERABILITY/SECURITY ASSESSMENTS
Licensees Completed Vulnerability/Security Assessments
on Sept 30, 2003
FERC received 273 Summary Reports for the
September 30, 2003 Deadline (many reports cover multiple dams).
• All Security Group 1 and Group 2 Dams (1,050) Completed Studies
• Used to Assess and Upgrade Security Where Necessary
• Used as Baseline for Future Needs
The following are cumulative results learned from the submittals:
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
F
Em orm
pl ed
oy In
ee te
Aw rna
l
Li are Wo
m n rk
In
it es G
cr
A
ea
s
r
se I cc e / Tr ou
p
a
n
s
d
D c re s /B i nin
e
a a g
In tect sed rrie
c r i o P rs
ea n
se Me atro
In
d as ls
cr
Lo u
ea
M
ck re
s
In C ed et w do s
c r re S h i w
e a at e th n
se ed riff LE
d S P A
Es
C ec at
t
Pu abl C y be urit rols
b l is h on r P y P
ic ed tr ro l a
a
In
fo Se c to tec t n
rm c u r C io
at rit o n
i o y nt
n Po ro
R s l
C es tr iti o
ar ic n
d t io
R
Ac n
ev
ce s
is
ss
ed
C
C
Ad all OO
d e Ch P
d ar
Al ts
ar
m
s
RESULTS OF LICENSEE VULNERABILITY/SECURITY ASSESSMENTS
Post 9/11 Interim Measures
50
45
40
35
30
25
20
15
10
5
0
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
oo
rd
in
Em atio
pl n w
oy /
A
Ve ee ge
A
h i w nc
c l ar ies
e
R ene
In
es s
tr
tri s
Al In
ct
ar c r
m e a C i on
/
C Mo sed CT
re ti o L V
at n o
e
In
D c
c r P Se et k s
e
e
In as eri m cur c tio
c r ed e ity n
e a C te P
se y b r C l an
d e o
G r
n
In ua Sec tro
c r rd u l
e a s / rit
s P y
G ed atro
ua L
In
r ig ls
cr
e a C d C hti n
se ard on g
tr
d
S Re act
he a
r de
Bo iff P rs
R
a t at
ei
Ba rol
nf
or W
rr
ie
ce a
W rni CO r
in ng O
R
do S P
es
w ig
tri
ct Ha Du s /D ns
S rd re oo
pi e ss r
l lw n
s
N ay S tr Al a
ei
r
gh Ga uc t m
u
bo t e re
rh C s
oo on
d tro
W l
at
ch
C
RESULTS OF LICENSEE VULNERABILITY/SECURITY ASSESSMENTS
What Were the Suggested Upgrades Identified by the Assessments?
Recommendations
80
70
60
50
40
30
20
10
0
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
An Issue - Recreation at Hydropower Projects
What does this mean for
licensees and
recreational access at
FERC Hydropower
Projects?
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
RECREATION REQUIREMENTS
In addition to approved recreation plansLicensees are required to provide free public access, to a
reasonable extent, to project waters and adjacent project
lands … for the purpose of full public utilization of such
lands and waters for navigation and for outdoor recreation
purposes… (L-forms)
Provided, that the licensee may reserve from public access
such portions of the project water, adjacent lands, and
project facilities as may be necessary for the protection of
life, health, and property.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
What Can A Dam Owner Do?
 Provide additional security measures
including personnel, lights, and cameras
 Work closely with local law enforcement
agencies to coordinate security
 Work with local recreation groups
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Options to Permanent Closure
Closures based on specific
threat
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Options
 Relocate a facility further from the dam or vulnerable
area in order to provide public access
Example- A licensee relocated its visitor center
further from the perceived vulnerable area in order to
continue to provide educational programs
 Opening access points during specific times such as
peak weekends, special events, and holidays.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Points To Consider
 Stay alert and informed.
 Notify appropriate Regional office and the
Washington office of changes at your project.
 Review and revise, where appropriate, the signage at
the project to reflect any changes to the public access
at the projects.
 Attend local community meetings, meetings with
local recreation groups such as anglers or whitewater
rafting groups.
 Put notices in the local newspapers in order to inform
the public of changes.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Vulnerability Assessment
Methodologies
 RAM-D & RAM-W – by Sandia Labs
 VA Analysis – simplified method
proposed by FERC in April 2003
– available for use by Owners
 DAMS-VR – latest method proposed by
FERC for their monitoring of Licensees
Security Programs – available from
FERC on a controlled basis
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
RAM-D - Risk Assessment
Methodology for Dams
Developed for the:
Interagency Forum for Infrastructure Protection
(IFIP)
by:
Sandia National Laboratories
Albuquerque, NM
Proprietary Information – Available under License only
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
RAM-D - Risk Assessment
Methodology for Dams
 Risk Equation R = PA * C * (1 – PE)
PA = Likelihood of attack
C = Consequences of the loss from the attack
PE = System Security effectiveness
(1 – PE) = Likelihood that security system is not
effective against an attack
R = Risk associated with an adversary attack
Proprietary Information – Available under License only
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
RAM-D - Risk Assessment
Methodology for Dams
 RAM-D addresses these items by a very
systematic and fully documented process:
– Screening events, consequences
– Planning, develop fault-tree, threat estimates,
consequences, assign priorities
– Site survey, detection, delay, response
– Analysis of “Adversary Sequence Diagrams”, system
effectiveness, calculate risks
– Risk Reduction, “Design Basis Threat”
– Upgrade evaluation, cost, operation, schedule, public
opinion
– Final Report
Proprietary Information – Available under License only
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
VA Analysis (Simplified Ram-D)
I.
1.
2.
3.
Threat Analysis (T)
Determine the presence and motivation of a
Threat
Does the above group have personnel/resources
sufficient to carry out the failure consequences
(specific targets to be identified in Steps 4 and 5)?
Estimate number of attackers, equipment, tools,
vehicles, weapons, and tactics for each group
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
VA Analysis (Simplified Ram-D)
II. Consequences (C)
4. Life Loss
4A. Dam Failure
4B*. Vulnerable Feature (i.e., Gate) Failure
5. Dam Mission (Power, Water Supply, Flood Control,
Navigation, Environmental)
6. For each group (from Step 2) record both Life Loss
Consequences:
7. For each group (from Step 2) record both Dam Mission
Consequences
8. Record the highest of above four Consequences for each
group identified from Step 2 (Low, Medium or High)
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
VA Analysis (Simplified Ram-D)
III. Security System Effectiveness (S)
9. Estimate Detection/Assessment Ability (DA):
Low
Medium
High
10. Estimate Delay Time (time from first detection to
action causing failure) (DT = minutes)
11. Estimate Effective Response Time (time from
first detection to deployment of sufficient
response force) (RT = minutes)
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
VA Analysis (Simplified Ram-D)
Security System Effectiveness (S) continued
12. Determine Security System Effectiveness (from
Steps 9, 10, and 11)
III.
DA=Low
DA =Medium
DA=High
DT < RT
Low (S)
Low (S)
Medium (S)
DT > RT
Low (S)
Medium (S)
High (S)
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
VA Analysis (Simplified Ram-D)
III.
Security System Effectiveness (S) continued
13. Compare maximum Consequence (C) (Step 8) for each identified
group to the Security System Effectiveness (S) (Step 12) to
determine the Attack Potential (AP) for that group:
Low (S)
Medium (S)
High (S)
Low C
AP = 1
AP = 1
AP = 1
Medium C
AP = 2
AP = 1
AP = 1
High C
AP = 3
AP = 2
AP = 1
If the Attack Potential is “1” for all groups, then no further analysis is
necessary. If the Attack Potential is “2”, or “3” for any group, then
compare it to the Threat Analysis for that group.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
VA Analysis (“Simplified Ram-D”)
III.
Security System Effectiveness (S) continued
14. Compare Attack Potential (AP) (Step 13) to Threat (T) (Step 2) for
each identified group:
Low Threat (T)
Medium Threat
(T)
High Threat (T)
AP = 1
No
No
No
AP = 2
No
No
Yes
AP = 3
No
Yes
Yes
If “Yes”, security enhancements are strongly suggested; continue with a
Security Assessment. If “No”, security enhancements may not be needed
unless the Threat Level increases for that group. Develop unified security
upgrades to address the identified weaknesses and vulnerabilities.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
DAMS-VR
 Available on request from FERC
Request from:
www.ferc.org/industries/hydropower/safety/security.asp
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
DAMS-VR
Step
SUMMARY OF METHODOLOGY –
REFER TO COMPREHENSIVE MANUAL
FOR DETAILED INFORMATION
Description
Table
Remarks
1
Consequence Rating Range
1
Each agency defines the range of
consequence values. These values are
used to modify Table 1 to agency
needs.
2
Benefits of project or facility
-
Define all project benefits
3
Project and Asset Consequences (C)
1
Assign the project a C value. Develop
a list of assets. Assign individual assets
C values, using numeric values from 110. Determine which assets are critical.
4
Vulnerability (V) of individual dam
structures and asset
4
Define the vulnerability of each
identified dam structure and critical
asset, using numeric values from 1-10
5
Essential Elements of information (EEI)
and Prioritized Intelligence
Requirements (PIR)
-
Develop a list of questions for a Threat
Specialist to quantify the Threat in the
area. Define actions needed to
compromise assets.
6
Probability of Loss (L) of each asset
3
Determine the Probability of loss for
each critical asset, using numeric
values from 1-10.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
DAMS-VR
Step
Description
Table
7
Loss Factor Rating (LF)
8
Priority Rating of Critical Assets
9
-
Remarks
LF = (V x L) for each critical asset.
4&5
Determine asset Priority Rating: Highly
Probable, Probable, Moderately
Probable, Improbable, or Extremely
Improbable. Drop assets with ratings of
Improbable and Extremely Improbable.
Threat (T) rating for individual Critical
Asset
6
Determine a Threat value rating (1-10)
for each Critical Asset.
10
Security Effectiveness (S) of individual
Critical Assets
7
Determine a security value rating (110) for each Critical Asset.
11
Asset Security Risk (ASR) of
individual Critical Assets
-
ASR = C x (V + L + T + S)
12-14
Evaluate ASRs and other data
-
Evaluate data; make recommendations
to reduce risks; obtain preliminary cost
estimates; prepare final report.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Review of Typical Cases
 A large urban water supply and hydro utility
 A large remote hydro project and arch dam
 A small high hazard arch dam
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
A Large US County Water Authority
• Wholesale Provider
• 90% Supply
• 2+ Member
Agencies
• 3 Million
Residents
• $100 Billion
Economy
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Existing Infrastructure
•
5 Pipelines (274 Miles)
•
1600 Structures
•
Dam & Reservoir
•
2 Hydro-generation Facilities
•
4 Pump Stations
•
260 Employees
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Major System Changes
•
•
1989 Capital Investment Plan Initiated ($1 B)
Pipelines, Pump-stations, Dam and Reservoir
Emergency Storage Project ($800 M) including
Watershed and Dam Operations (90,000 af additional
storage)
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Vulnerability Assessment
Vulnerability Assessment
•
In-house HA/VA Nov. 2001
•
VA’s (RAM-W & RAM-D) Completed 2002 / 2003
•
Cyber Security Evaluation Completed 2002
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Physical Security
Physical Security
•
Fencing (anti-vehicle)
K-rail/Jersey Barrier
Bollards
Clamshells
Landscape Removal
Proximity Cards
•
Increased Stand-off Distance
•
Close or Redirect Roads
•
•
•
•
•
6th October 2004
Lock Changes ($40 K)
Welding Hatches & Nuts
Double Screen Vents
Earth Berm & Rocks
Gates & Signs
CCTV
CESI Security Workshop, Milan
Robin Charlwood
Operational Security
Operational Security
•
Increased Patrols (log in required)
•
Emergency Water Allocation Plan
•
Increased Drills / EOC Activation
•
Purchased EOC Software (E-team)
•
Increased WQ Sampling
•
Security Workshops
•
Neighborhood Watch
•
ERP to ICP
•
Security Plan & Matrix
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Communication/Coordination
Communication/Coordination
•
•
•
•
•
•
Law enforcement Tours (Sheriff, Local PD, FBI)
Threat Briefings, Maps, Exercise, GPS Coordinates
Member of FBI InfraGard Program
Security – Operating Head (interagency meetings)
Communication – Need to Know
Tours – Appointment Only
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
A Hydro Project Security Plan
Security Procedures: Threat levels may be set in accordance with local conditions at each generation site. Security procedures will be put in place
that are specific to each site. Procedures will be updated annually and maintained at each powerhouse and by the Generation Plant Operations
Director.
GREEN
BLUE
Normal plant access with passive security measures in place to keep general public from
non-restricted areas and to protect public from normal hazards and to prevent theft and
Low risk of
No specific threat to vandalism. Employees will carry current identification cards and residents will have
terrorist attack generation facility
current photo identification.
General terrorist
General risk of threats to national
terrorist attack infrastructure
Restricted public access. No general access to dams or powerhouses. Employees are
expected to be inquisitive about strangers and vehicles in unauthorized areas and to
report suspicous activities to proper authorities. Contractors must make prior
arrangements to be on site with site manager or powerhouse staff. All personnel and
contractors must have proper photo identification.
YELLOW
Terrorist threat to
Significant risk area predicted in
Response will be the same as for blue level advisory with addition of security staff on site
of terrorist
vicinity of generation should situation require higher level of security. Equipment and vehicles may be
attack
facility
inspected.
ORANGE
Tours suspended. Personnel and contractors must have proper photo identification if
requested by security personnel. Visitors will be allowed only for official business and
must have prior approval and proper identification. Gates may be closed with access by
employees only. Onsite security personnel may be assigned to guard entrance gates
and the dam access gates during business hours. Visitors' log will be used and nonemployees will be issued permits to be on site. Security staff may inspect equipment
and vehicles. Staff will review evacuation plans and staffing arrangements in the event that
threat is elevated to highest threat level (red).
RED
Credible report of
terrorist attack
High risk of
and/or attack is
terrorist attack imminent
Generation site is
Severe risk of
threatened or
terrorist attack
attacked
Plant is locked down and only authorized powerhouse crew personnel will be admitted
onto the project site. Security personnel will be on site. Powerhouse staff will verify all
entrance gates/doors are locked. Employees will carry proper photo identification at all
times.
Equipment will be secured for automatic operation. The site will be evacuated except for
the operating employees required to protect the public from facility failure downstream of
the site. Employees will carry proper photo identification at all times.
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
A small high hazard arch dam
See separate VA Analysis results of:
1. Existing security
2. Upgraded Security
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Key Issues
As discussed at a US
Security and Emergency
Preparedness at Dams
Workshop
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Workshop – March 2003
Three detailed panel discussions covered:
• Planning and Managing Security
Concerns
• Preparing for an Emergency
• Responding to an Emergency
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Workshop – March 2003
Planning and Managing Security Concerns
1. Difficult to protect against a concerted attack (pre-warning only)
* What constitutes an appropriate response to larger threats?
2. Conflicting regulations from different agencies may create
conflicts
* Varied warnings from various agencies
3. Balancing the flow of information vs. protecting critical
information
4. Information sharing between dam owners
* Reporting incidents
* Coordinating with u/s and d/s owners
5. Sweeps of al-Qaeda intelligence: is there proof of dam targeting?
* Intelligence analysis: looking for patterns
6. Nation-wide security guidance (due diligence)
7. Consistency in addressing recreational concerns
8. R&D (waterborne routes, gate protection, emb. crest protection)
9. Identification checks at conferences and workshops
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Workshop – March 2003
Preparing for an Emergency
1. Real-time river forecasting needs coordination w/dam owners
2. Each state should pass regulations for information protection
3. How best to provide emergency information to the public
* Keeping parents away from children in schools
4. GIS compatibility with various agency mapping systems
5. Coordination of security with dam safety meetings/exercises
6. FERC guidance on “sanitizing” EAP content
7. Education that immediate response comes from local law enf.
* FBI needs to be contacted, but will come in later
8. National consistency in emergency nomenclature wording
9. Closely follow DHS development of national model for ICS
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood
Workshop – March 2003
Responding to an Emergency:
1. How are response costs paid for a dam failure?
2. Determining who needs to be evacuated versus who does
not
* Determining sheltering needs more accurately?
3. How best to involve amateur radio operators in a response
4. Electronic (GIS) versus paper inundation maps
5. Prioritization of restoring public services during recovery
6. Importance of flood depth data to responders
7. Communication systems reliability
* Cell saturation / land lines / radio
8. Dam owner representative inserted into Emergency Ops
Center
* Coordinating/controlling public information
6th October 2004
CESI Security Workshop, Milan
Robin Charlwood