160 likes | 180 Views
Enhance emergency response with hazard assessments, infrastructure hardening, and more. Learn the vital 4 D's of emergency management.
E N D
FACILITY TARGET HARDENING CY6 September 26, 2019 SSO Inc. D4 Training CY6
THE 4 D’S OF D4 DETECT: Hazard and vulnerability assessments DETER: Infrastructure target hardening, planning, training pre-incident DELAY: Maximizing survival through practical application of planning and training DEFEAT: Protecting the vulnerable SSO Inc. D4 Training CY6
HOMELAND SECURITY PRESIDENTIAL DIECTIVE 5 • HSPD5 was signed immediately after 9-11 and took effect July 1, 2005 • Set national standardization of emergency response in governmental and non-governmental agencies • Adoption of NIMS and ICS into emergency planning nationally SSO Inc. D4 Training CY6
PRESIDENTIAL POLICY DIRECTIVE 8 • PPD8 was signed in 2011 and took effect on July 1, 2013 • Set national preparedness goals for infrastructure target hardening in governmental and non-governmental agencies • Prepare for worst case incident of terrorist attacks SSO Inc. D4 Training CY6
FEMA EMERGENCY MANAGEMENT GUIDES • FEMA Guides for emergency planning were created based on PPD8 • Guides for schools, businesses, and places of worship • Hazard and Vulnerability Assessments for all facilities are basically the same SSO Inc. D4 Training CY6
FIVE MISSION AREAS OF EMERGENCY MANAGEMENT • PREVENTION • PROTECTION • MITIGATION • RESPONSE • RECOVERY All five mission areas come into play during the Hazard and Vulnerability Assessment process SSO Inc. D4 Training CY6
F.B.I. ACTIVE SHOOTER DEFINITION • One or more individuals ACTIVELYengaged in killing or attempting to kill people in a populated area • One or more firearms is used • Both law enforcement personnel and citizens have the potential to affect the outcome based on their responses to the situation SSO Inc. D4 Training CY6
FBI 2018 ACTIVE SHOOTER STATISTICS • 27 incidents in 16 states • 213 casualties • 85 killed, not including the killers • 2 law enforcement officers and 1 unarmed security were among the killed • 128 wounded, (some wounded were not by gunfire) • 27 killers, (23 male, 3 female, 1 still at large) • 10 committed suicide, 11 arrested, 4 killed by police, 1 killed by citizen. 1 still at large • 9 incidents ended with exchange of gunfire between suspect and police SSO Inc. D4 Training CY6
ACTIVE SHOOTER LOCATIONS • 16 of the 27 incidents occurred in areas of commerce • Of those, nine incidents occurred in businesses open to the public, resulting in 27 killed and 44 wounded • 5 incidents occurred in schools • 2 incidents occurred in health care institutions • 2 incidents occurred in open space locations SSO Inc. D4 Training CY6
FIVE EMERGENCY INCIDENT RESPONSE ACTIONS • Lockdown (immediate threat) • Lock Out (threat in the area) • Evacuate (Fire or internal threat) • Duck-Cover-Hold (E.Q. or explosion) • Shelter-In-Place (HAZMAT or weather) SSO Inc. D4 Training CY6
HAZARDS AND RISKS ASSESSED • Weather related • Fire (wildland and structural) • Criminal Activity • HAZMAT (inside the facility and in the area) • Nuclear Hazards • Earthquake and Seismic Activity • Pandemic and Epidemic • Utility disruptions • ACTIVE ASSAILANT • Weapons and bombs in the facility • Hospitals, Medical Transport, Medical Care On Site • Terrorist Threats • Communications Systems (internal and external) SSO Inc. D4 Training CY6
WHAT TO LOOK FOR • Perimeter lighting, particularly near entrances and parking • Existing emergency plans • Response procedures • How do the doors lock • Who has keys • Internal Safe Rooms • Evacuation Plans • Communications procedures • Continuity of Operations Post-Incident • Acceptance of Emergency Response • High Risk Vulnerabilities SSO Inc. D4 Training CY6
TARGET HARDENING • Access control and secure perimeter • CPTED • Visitor management • Proper signage • How to lock down the facility • Door locks and glass vulnerabilities • How to quickly evacuate • Safe rooms SSO Inc. D4 Training CY6
PUBLIC ACCESS • Businesses and facilities open to the public must still have access points, but access can be controlled, and visitors monitored • Video is good, but unless it is monitored is is highly reactive • Security is a good deterrent if it is possible SSO Inc. D4 Training CY6
VISITOR MONITORING SYSTEMS • An effective system scans I.D., logs a visitor in, prints photo identification badge, and sends a text to the person the visitor is there to see • The recommended best practice it to have visitors not be able to leave a secure lobby area without an escort so any violent incident is contained in the lobby SSO Inc. D4 Training CY6
QUESTIONS Bruce Kirby bfkirby@yahoo.com www.schoolsafetyops.com (775) 287-5645 SSO Inc. D4 Training CY6