420 likes | 647 Views
Pollution Prevention and Homeland Security. Michael J. Ellenbecker Kwangseog Ahn. Homeland Security & Preventing Pollution from Attack on Critical Waterside Infrastructure Presented by Ed Badolato , Executive VP, Homeland Security The Shaw Group. New Hampshire Pollution Prevention Conference
E N D
Pollution Prevention and Homeland Security Michael J. EllenbeckerKwangseog Ahn
Homeland Security & Preventing Pollution from Attack on Critical Waterside InfrastructurePresented byEd Badolato, Executive VP, Homeland Security The Shaw Group New Hampshire Pollution Prevention Conference University of New Hampshire September 21, 2004
Vulnerability: How to Audit Your Facility Presented by Ed Badolato Executive Vice President for Homeland Security The Shaw Group University of New Hampshire September 21, 2004
The New Environmental Paradigm • Certain parts of the infrastructure are attractive targets for terrorists • Mass casualties • Property damage • Economic losses • Environmental impact • We must reduce risk from indirect releases into the environment
Osama bin Laden’s Targeting Philosophy “Inflict maximum damage to human, economic and physical infrastructures” “Attack symbolic, high prestige, economic, and strategic targets”
Four Bad Things That Can Happen from a Terrorist Attack on Your Facility • Loss of containment • Theft or misuse with intent to cause harm • Worker internal or public harm offsite • Degradation of assets, business functions, or company value
CRITICAL INFRASTRUCTURES • Chemicals and Hazardous Materials • Energy • Transportation • Water • Telecommunications • Agriculture & Food • Banking and Finance • Public Health • Emergency Services • Defense Industrial Base • Postal and Express Shipping
This book was co-authored by Ed Badolato It covers: Industrial disasters Process related incidents The terrorist threat to populated areas Sabotage of chem facilities and RR tank cars The cost factor Vulnerability of Petro-Chem Facilities
Plug the security gaps noted in industry “Lessons Learned” & “Best Practices” Work across the full spectrum of Homeland Security incidents—preparation, response, recovery Adopt and adapt technology fixes Organize a layered, integrated security system Terrorism and the Chemical Transportation Industry
What We Can Expect in the Future • More mass casualty attacks-- “few attacks in the US, but they will be closer to the Madrid rail scenario than the WTC 9/11” • Terrorist conventional bombings along with WMD attempts-- “bombs will be the most predominant form of attack” • More terrorist cells and operatives will be uncovered in the US
Laws & Regulations that Impact Facility Preparedness • Clean Air Act • Bioterrorism Preparedness and Response Act of 2002 • Maritime Transportation Security Act of 2002 • Resource Conservation and Recovery Act of 1976 • Occupational Safety and Health Act • Emergency Planning and Community Right-to-Know Act
Chemical/Environmental Security Players • Key Agencies & Organizations • Department of Homeland Security (DHS) • Environmental Protection Agency (EPA) • Department of Justice • Department of Defense • State & Local Emergency Response • Industry Associations—ACC, SOCMA, and state industry organizations • American Institute of Chemical Engineers • Secondary Agencies & Organizations • DOT • OSHA • DOE
DHS and the National HS Strategy The three objectives of the national strategy: 1. Prevent terrorist attacks within the US 2. Reduce Americas vulnerability to terrorists 3. Minimize the damage and recover from attacks that do occur
DHS Infrastructure Protective Measures Plan • Technical Applications • WMD Prevention • Protection Measures • Buffer Zone Protection Plan (BZPP) • 1700 sites this year • Target selection • Surveillance Ops • Planning Ops • Rehearsals • Training
Industry Safety Management Capabilities • Process Safety Management Systems • Hazard Evaluation Procedures • Chemical Process Quantitative Risk Analysis • Release Mitigation • Safe Storage & Handling of High Toxic Hazard Materials • Layer of Protection Analysis
We Must Work Across the Full Spectrum of Homeland Security Situations
Suggestions for Industry • The new industry security strategy should: • Identify and prioritize critical infrastructure facilities. • Specify security roles and responsibilities. • Describe appropriate threat/alert information flows. • Set the standards for actionable security plans
Suggestions for Your Facility • Assume you are a target • Extend your perimeter—”mutual support” • Barriers • Surveillance • Planning • Inform & engage employees
The Security Vulnerability Assessment Process Project Planning Meeting--Setting the right course with the company/client Facility Characterization and Critical Asset Identification--A thorough characterization of site asset characteristics and hazards Identify and Prioritize the Threat--Complete evaluation of threats; internal, external, internally-assisted Vulnerability Analysis--Prioritized evaluation of threats against assets Risk Assessment —defining the potential for damage to or loss of an asset Countermeasures Identification and Effectiveness Measurement--Prioritized validation and justification of costs for improved security, highlighting process/operations benefits Preparing the Report Implementation
Threat Methodology • Understand how terrorists target facilities • Build a detailed, focused assessment • Initial screening of sources of threat info • Contact with local, state, & federal law enforcement and intelligence agencies • Interviews with facility security managers
Vulnerability Assessment “Identification of the extent of susceptibility to exploitation, relative to the existence of any countermeasures.”
Two Approaches to Vulnerability Analysis • Asset-based analysis: assess potential targets (any attack scenarios) • Scenario-based analysis: assess attack scenarios (any asset)
VA Asset-Based Approach • Where used: • “Basic” sites, i.e. no complex security challenges • Key Elements • Assess and categorize consequences • Assess target attractiveness • Identify and assess key assets • Based on consequence and attractiveness • Identify areas needing further protection
VA Scenario-Based Approach • Where Used: • Complex security challenges • High inherent threat • Key Elements • Identify key assets/targets • Identify applicable threats • Identify potential scenarios • Drives countermeasures for selected scenarios
RISK • Risk assessment—”a qualitative and/or quantitative determination of the probability of occurrence of an adverse event and the impact of its consequences.”
Step 6. Countermeasures Identification and Effectiveness Measurement-
Physical Security Systems • Perimeter Protection • Fences • Lights • Gates & Access Controls • Entrance/equipment locks • Protection Force • Electronic security systems--motion detectors • Video surveillance systems, • Building alarm systems
Other Countermeasures • Loss prevention & material control • Control room security • Distributed Control Systems • Crisis management and emergency response • Policies & procedures • IT/Cyber security • Intelligence
SUMMARY • SVAs Perform Important Functions • Defines roles & relationships • Identifies necessary resources • Ensures comprehensive security effort • Sets plan for implementation
MODULE 2: Introduction to theToxics Use Reduction Act Todd_MacFadden@uml.edu Toxics Use Reduction Institute 978.934.3391
Measure Success Pre-Plan Process Characterization Implement Plan Responsibilities of a TUR Planner Identify TUR Options Certify Plan Screen & Evaluate TUR Options Develop or Update Plan The TUR Planning Cycle
Measure Success Pre-Plan Process Characterization Implement Plan Identify TUR Options Certify Plan Screen & Evaluate TUR Options Develop or Update Plan Similarities in the Security and TUR Assessment Processes The TUR Planning Cycle The Security Vulnerability Assessment Process • Project Planning Meeting • Facility Characterization and Critical Asset Identification • Identify and Prioritize the Threat • Vulnerability Analysis • Risk Assessment • Countermeasures Identification and Effectiveness Measurement • Preparing the Report • Implementation
Importance of TUR in HS CRITICAL INFRASTRUCTURES • Chemicals and Hazardous Materials • Energy • Transportation…
Pollution Prevention and Homeland Security • Can use similar assessment methods • PP personnel may be qualified to perform HS assessment, particularly in industry using hazardous chemicals • PP itself reduces risks in HS • Lower toxicity • Lower volatility/explosion potential • Lower volumes store on site
Opportunities for TURI • Appears there is lack of interaction between TUR/PP and HS • TURI already has the expertise and resources for TUR/PP that can be applied directly to HS
What TURI Can Do? • Advocate TUR to reduce HS risks • Extend TURP program to TUR-HSP program • Identify and prioritize the HS risks from hazardous chemicals • Use TURA data and TRI data including use amounts, locations of plants, etc. • Use chemical info including explosiveness, flammability, toxicity, etc. • Use other information about presence of symbolic, high prestige, economic, and strategic targets • Combine all the information to prioritize the HS risks • Use the planning process to reduce HS risks
Funding Sources? • DHS • EPA • OSHA • NSF • MA?