220 likes | 256 Views
Learn how to spot terrorism signs and assess risks to safeguard employees against man-made disasters in this informative webcast and satellite training series brought to you by expert panelists. Understand the six signs of terrorism and delve into the Risk Assessment Methodology (RAM) for effective mitigation strategies. Discover specific terrorist threats and methodologies to protect your organization. Stay informed and prepared for potential threats in upcoming events.
E N D
Safeguarding Employees Against Man-Made Disasters Webcast & Satellite Training SeriesAugust 26, 2005 Brought to you in partnership with:
Panelists • Bob Hart, President, The Innovation Groups (Moderator) • Gerry Hoetmer, Executive Director, Public Entity Risk Institute • Lt. William Harding, WMD Expert, Clearwater, FL Police Department • Lt. John Kost, Homeland Security Unit, Sarasota County, FL Sheriff’s Office • Dave Vago, P.E. Operations Services Manager, Wade Trim Engineering
Terrorism We tend to think of terrorism in terms of large, global events that occur in large cities and impact visible landmarks. But terrorism can and often does happen in smaller settings and involves fewer people than a WTC type event.
Six Signs of Terrorism • Surveillance • Elicitation • Testing Security • Acquiring Supplies • Conducting Dry Runs • Deploying Assets or Getting Into Position Source: Michigan State Police
1. Surveillance • Objective is to determine strengths and weaknesses as well as response times. • Methods • Recording or Monitoring Activities • Drawing Diagrams • Making notes or Maps • Using Vision Enhancing Devices • Possessing Floor Plans or Blueprints • DETECTION – Look for any suspicious people or people who don’t belong.
2. Elicitation • Objective is to get those with potential inside information about critical elements (i.e. power supplies, water supplies, HVAC) to reveal it. • Methods • Fax • Phone • Questioning personnel • Mail in requests • DETECTION– Who is seeking information & why?
3. Testing Security • Objective is to determine the veracity of the security force to challenging entry by strangers. • Methods • Use main entrances • Walk or Drive into secured areas and observe response • Attempts to “hack in” • DETECTION – Look for any suspicious people or people who don’t belong.
4. Acquiring Supplies • Objective is twofold: • To acquire the necessary supplies to perpetrate the attack • To acquire the necessary gear (uniforms, badges, I.D. Cards, decals) to blend into the environment (and thus become invisible). • Methods • Purchase (including black market) • Steal • DETECTION– Anything missing?
5. Conducting Dry Runs • Objective is to move people and equipment into place – without deploying – to further test response. • Methods • Test traffic patterns into and out from site • Move equipment into secured areas and over selected routes • Coordinate movement • DETECTION – Don’t catch it now then step 6 is GOING TO happen.
6. Deploying Assets • Objective is to perpetrate the attack • Methods – Essentially the same as the dry run but in real-time with implements of destruction • DETECTION – Notification – How smart is your building?
Move to Response/Recovery • Emergency Response Plan – Well thought out. Drilled response • Rescue Teams – Move victims to safety • Detection – External versus Internal • Tactical Response – Take out the terrorists
What Are Specific Threads? • Improvised Explosive Device (Bombing) • Chemical Agents • Biological Agents • Radiological Agents • Arson/Incendiary Attack • Armed Attack • Nuclear Attack • Unauthorized Entry
RISK ASSESSMENT METHODOLOGY (RAM SM) • Developed by SANDIA Labs in conjunction with the U.S. Government and various professional agencies.
RISK ASSESSMENT METHODOLOGY (RAM SM) • Provides a systematic approach to the assessment of risk by looking at the dangers that are faced and the protections in place – Common Sense Mitigation.
The Risk Equation R = PA * (1 – PE) * C Risk Ranges from 0.1 (minor disruption) to 0.9 (loss of life, etc.) Ranges from 0.0 to 1.0, but use 1.0 Ranges from 0.1 (Total Destruction Likely) to 0.9 (virtually Certain to survive)
RISK ASSESSMENT METHODOLOGY (RAM SM) • Characterization of the facility 2. Determination of critical assets that might be subject to malevolent acts 3. Threat Analysis – Identification and Prioritization of adverse consequences
RISK ASSESSMENT METHODOLOGY (RAM SM) 4. Assessment of the likelihood (qualitative probability) of such malevolent acts 5. Evaluation of existing countermeasures 6. Analysis of current risk 7. Prioritized plan for risk reduction
Up Coming Events Don’t miss out! • Jan 27, 2006 - Maximizing The Value Of Your Assets • FREE!* March 24, 2006 - Performance Measures in Government • April 26, 2006 - Deriving Benefits For Your Stake Holder Using The Balance Scorecards