Transcript Slide 1

Safeguarding Employees Against Man Made Disasters

Webcast & Satellite Training Series August 26, 2005 Brought to you in partnership with:

Panelists

• Bob Hart,

President, The Innovation Groups (Moderator)

• Gerry Hoetmer,

Executive Director, Public Entity Risk Institute

• Lt. William Harding,

WMD Expert, Clearwater, FL Police Department

• Lt. John Kost,

Homeland Security Unit, Sarasota County, FL Sheriff’s Office

• Dave Vago,

P.E. Operations Services Manager, Wade Trim Engineering

Terrorism

We tend to think of terrorism in terms of large, global events that occur in large cities and impact visible landmarks.

But terrorism can and often does happen in smaller settings and involves fewer people than a WTC type event.

Six Signs of Terrorism

1. Surveillance 2. Elicitation 3. Testing Security 4. Acquiring Supplies 5. Conducting Dry Runs 6. Deploying Assets or Getting Into Position

Source: Michigan State Police

1. Surveillance

• • •

Objective is to determine strengths and weaknesses as well as response times. Methods

– – – – –

Recording or Monitoring Activities Drawing Diagrams Making notes or Maps Using Vision Enhancing Devices Possessing Floor Plans or Blueprints DETECTION – Look for any suspicious people or people who don’t belong.

2. Elicitation

• • •

Objective is to get those with potential inside information about critical elements (i.e. power supplies, water supplies, HVAC) to reveal it.

Methods

– – – –

Fax Phone Questioning personnel Mail in requests DETECTION – Who is seeking information & why?

3. Testing Security

• • •

Objective is to determine the veracity of the security force to challenging entry by strangers.

Methods

– – –

Use main entrances Walk or Drive into secured areas and observe response Attempts to “hack in” DETECTION – Look for any suspicious people or people who don’t belong.

4. Acquiring Supplies

• • •

Objective is twofold: 1.To acquire the necessary supplies to perpetrate the attack 2.To acquire the necessary gear (uniforms, badges, I.D. Cards, decals) to blend into the environment (and thus become invisible).

Methods

Purchase (including black market)

Steal DETECTION – Anything missing?

5. Conducting Dry Runs

• • •

Objective is to move people and equipment into place – without deploying – to further test response.

Methods

Test traffic patterns into and out from site

Move equipment into secured areas and over selected routes

Coordinate movement DETECTION – Don’t catch it now then step 6 is GOING TO happen.

6. Deploying Assets

• •

Objective is to perpetrate the attack Methods – Essentially the same as the dry run but in real-time with implements of destruction

DETECTION – Notification – How smart is your building?

Move to Response/Recovery

• • • •

Emergency Response Plan – Well thought out. Drilled response Rescue Teams – Move victims to safety Detection – External versus Internal Tactical Response – Take out the terrorists

What Are Specific Threads?

1. Improvised Explosive Device (Bombing) 2. Chemical Agents 3. Biological Agents 4. Radiological Agents 5. Arson/Incendiary Attack 6. Armed Attack 7. Nuclear Attack 8. Unauthorized Entry

RISK ASSESSMENT METHODOLOGY (RAM

SM

)

RISK ASSESSMENT METHODOLOGY (RAM SM ) •

Developed by SANDIA Labs in conjunction with the U.S. Government and various professional agencies.

RISK ASSESSMENT METHODOLOGY (RAM SM ) •

Provides a systematic approach to the assessment of risk by looking at the dangers that are faced and the protections in place – Common Sense Mitigation.

The Risk Equation

Risk R = P A * (1 – P E ) * C Ranges from 0.0 to 1.0, but use 1.0

Ranges from 0.1

(minor disruption) to 0.9 (loss of life, etc.) Ranges from 0.1 (Total Destruction Likely) to 0.9

(virtually Certain to survive)

RISK ASSESSMENT METHODOLOGY (RAM SM )

1. Characterization of the facility 2. Determination of critical assets that might be subject to malevolent acts 3. Threat Analysis – Identification and Prioritization of adverse consequences

RISK ASSESSMENT METHODOLOGY (RAM SM )

4. Assessment of the likelihood (qualitative probability) of such malevolent acts 5. Evaluation of existing countermeasures 6. Analysis of current risk 7. Prioritized plan for risk reduction

Questions?

Up Coming Events

Don’t miss out!

Jan 27, 2006

- Maximizing The Value Of Your Assets •

FREE!* March 24, 2006

Performance Measures in Government •

April 26, 2006

- Deriving Benefits For Your Stake Holder Using The Balance Scorecards