National Center for Risk and Economic Analysis of Terrorism Events University of Southern California Los Angeles, California
|
|
- Andrew Mitchell
- 7 years ago
- Views:
Transcription
1 National Center for Risk and Economic Analysis of Terrorism Events University of Southern California Los Angeles, California Using Risk Assessment, Economic Assessment, and Risk Management to Improve Preparedness for Terrorist Attacks and Natural Disasters: A Methodology for a Qualitative Assessment of Target Capabilities of the Department of Homeland Security Mayank Mohan and Detlof von Winterfeldt International Institute for Applied Systems Analysis (IIASA) Laxenburg, Austria PARTNERS University of Southern California (Lead) International Institute for Applied Systems Analysis (IIASA) RAND Corporation Wharton School, University of Pennsylvania "This work was supported by the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) at the University of Southern California under Purchase Order No to IIASA. This document was prepared under a cooperative agreement from FEMA 's National Preparedness Directorate, U.S. Department of Homeland Security. Points of view or opinions expressed in this document are those of the authors and do not necessarily represent the official position or policies of FEMA's National Preparedness Directorate or the U.S. Department of Homeland Security." FEMA Grant No GA-T8-K004 Department of Homeland Security June 30, McClintock Avenue, RTH 314 ~ Los Angeles, CA ~ (213) ~
2 Executive Summary Methodology for Qualitative Assessment of Target Capabilities This report describes the methodology for conducting a qualitative assessment of capabilities for prevention, protection, response and recovery described in the Department of Homeland Securities Target Capabilities List (U.S. Department of Homeland Security, 2007). This methodology was applied to assess 37 target capabilities against a terrorist attack using an Improvised Explosive Device (IED). The description of the progression of an IED attack was based on the National Planning Scenario 12 (NPS). In particular, we used the IED attack tree (DFI Government Services, 2006a and b) as a basis of our qualitative model. We thus relied on and built on two significant and existing pieces of prior work by the DHS, which helped us to maintain continuity of work and maintain conformity of language and presentation. The National Planning Scenario-12 and the associated attack tree describe in great detail and depth the activities that terrorists would have to undertake for successful execution of an IED based attack. From this attack tree, we identified the critical tasks of the terrorists possible activities associated with an IED attack, the events that influence these activities, and the consequences of a successful attack. Using the information from this review, we developed the influence diagram (Clemen and Reilly, 1996) shown in Figure 1, which presents the critical components of a terrorist attack and how they influence each other. The influence diagram is a compact description of an attack tree. It describes only the nodes that are included in an attack tree, but not the alternative attack modes or events emanating from these nodes. Put another way, an attack tree is an expanded version of an influence diagram. This one-to-one mapping of trees and influence diagrams is well known in decision analysis, where influence diagrams, event trees, and decision trees are often used as alternative ways of mapping sequences of actions and events. In fact, the software used to create the influence diagrams in this report allows conversion to an event or decision tree and the subsequent quantitative cost-risk-benefit analysis. Thus, the qualitative influence diagram is in fact a first step to the quantitative decision analysis. Figure 1: IED Attack and Consequences Critical Components 2
3 The influence diagram of Figure 1 does not include any interventions by the United States government agencies, using existing or new capabilities. The second step in our qualitative assessment methodology was to create an overlay of each capability in the TCL to describe how a target capability influences certain terrorist activities. The key idea here is that a capability influences a terrorist action or event by reducing the threat, vulnerability, or consequences represented by a given node in the influence diagram. These relationships are represented as additional influence arcs in the influence diagram (see, for example, Figure 2.) To highlight that a node of the terrorist attack tree is influenced by a capability, we have changed this node to a diamond. For example the target capability labeled CBRNE detection affects the terrorists ability to obtain IED components and the terrorists decision to conduct an attack. We developed the capability overlays for all relevant TCL Capabilities (Common Mission Area, Prevent Mission Area, Protect Mission Area, Respond Mission Area and Recover Mission Area). (See figures 2-30 for overlays of Capabilities on IED Attack Critical Tasks). The influence diagram and the capabilities overlays are in itself useful outputs of the qualitative analysis. First, they provide a compact description of attack trees, which are often unwieldy in their expanded form (e.g., Figure 1 is still quite readable, compared to a printed version of the full IED attack tree). Second, they provide an indication of which parts of a terrorist attack are influenced by a given capability. For example, figures 2-30 thus give an indication of the breadth and possible importance of capabilities for interfering with a terrorist attack and/or reducing its consequences. These influence diagrams may also help identifying new capabilities that can interfere with terrorist activities or reduce their consequences but that are not currently addressed by existing target capabilities. While we developed the influence diagrams represented in Figures 1-30 using the NPS-12 scenario attack tree, the TCL for IEDs and our own judgments, we believe that the results are quite reproducible. To make a further step towards a quantitative analysis and to identify high-priority target capabilities for further analysis, we conducted a very simple judgmental scoring exercise to rate target capabilities in terms of their effectiveness and their costs. This part of the analysis is merely illustrative, since it is based on the two authors judgments only. Validation using DHS staff and intelligence analysts would be needed before this methodology can be applied in the field more broadly. Effectiveness was scored on thirteen criteria related to the degree to which the 37 capabilities are likely to reduce a threat, vulnerability or consequence of a terrorist attack. Effectiveness of a capability on each criterion was scored by us as shown in the spreadsheet screenshot of Figure 31. For each effectiveness criterion we made a qualitative judgment of whether the capability s effectiveness is high, medium, low, or not applicable. We used the influence diagrams in Figures 2-30 to guide this judgment. In addition, we scored the costs of the 37 capabilities on a three point high-to-low scale (high indicating high cost) in terms of 1. Social costs (e.g., intrusion of privacy, creation of inconveniences) 2. Investment cost (i.e., capital outlays) 3. Operations cost (i.e., annual costs for operation and maintenance) 4. Implementation time (i.e., years to implementation) 3
4 We also created aggregate effectiveness and cost scores based on a weighting of low, medium, and high costs and effectiveness as described at the end of this report. Finally, we calculated an indicator of cost-effectiveness by dividing the effectiveness score by the cost score thus providing a preliminary ranking of target capabilities. At this point it is important to caution that our judgments of cost and effectiveness as well as the scoring model are very tentative. They were completed in this study to demonstrate the methodology, not to suggest priorities or recommend policies. To improve and validate these judgments a major exercise involving DHS scientists and staff as well as members from the intelligence community would need to be conducted. With this caution in mind, our own judgments lead to the conclusion that the following five capabilities score highly in terms of cost-effectiveness: 1. Counter Terror Investigation and Law Enforcement 2. Intelligence Analysis and Production 3. CBRNE Detection 4. Critical Infrastructure Protection 5. Responder Safety and Health A detailed description of the influence diagrams and the scoring procedure is provided below. From the influence diagram of Figure 1, it is clear that there are certain critical components in the terrorists chain of activities. These critical components are: 1. Effective Decision Making a. Leadership b. Clear goals and objectives c. Resources d. Perception of sufficient damage Any US capability that interferes with any of the four elements will affect terrorists decision to carry out an IED attack. 2. Ability to collect primary resources a. Financial resources b. Operation s personnel c. Documents d. Information To obtain each of these resources, the terrorists could rely on more than one method. For example financial resources could be obtained through personal funds of the terrorists or through an illegal means such as money laundering. Given the range of possibilities, it may be difficult to effectively reduce the ability to collect resources. 3. Physical Access to target sites a. Obtain necessary information about security procedures at the site b. Explore possibility of finding blind spots in security possible sympathizer, not all entry points are well protected c. Avoid detection of the IED device 4
5 d. Pass check points without interdiction Methodology for Qualitative Assessment of Target Capabilities Physical access thus, for most part, relies on the terrorists ability to understand the features of the security measures at the checkpoints and possessing necessary documents. 4. Develop IED capability a. Skills for IED development b. Obtain components c. Obtain facility to develop IED d. Transport components to facility e. Successful testing As in the case of primary resources, each element for developing an IED could be achieved by one or combination of means. And given the possible permutations to successfully develop an IED, it may seem difficult to counter IED development. However, the difference here is that IED development requires certain key items such as explosive materials. Focusing attention on sale and movement of explosive materials thus may be an effective way of countering an IED attack. 5. Successfully detonate device a. Have a thoroughly tested device b. Possess personnel with suitable mindset to carry out the detonation c. Smuggle the device to detonation site d. Locate suitable location within the site to place the device e. If the device is remotely detonated, have a well tested remote detonation device These critical tasks are drawn from the National Planning Scenario. In addition to these tasks, we added the consequences of an IED attack. 6. Direct Human Injury. These are human injuries resulting directly from the IED explosion. Once an IED is detonated much can be done to reduce the magnitude of human injury. These steps are identified as: a. Provide immediate and effective care to survivors b. Search for and rescue possible survivors c. Provide necessary short term and long term medical care 7. Indirect Human Injury. These injuries do not arise directly from the detonation. Steps to reduce such injuries may be: a. Determine and eliminate any environmental or ecological threat from the detonation b. Control access to the detonation site c. Reduce psychological impacts 8. Direct Economic Loss. This is the loss arising from the detonation: a. Structural Damage b. Costs of conducting response and recovery efforts 9. Indirect Economic Loss. These losses occur after the detonation and include both short term and long term losses: a. Business disruption at detonation site 5
6 b. Economic impact on area affected (e.g., less tourists) c. Economic impacts on the nation The next steps in the overall methodology are to map the DHS capabilities on the IED attack influence diagram to determine interfaces and potential impact on risks of such an attack, and then conduct an assessment of the effects and cost of these capabilities. These steps are discussed in the main body of the report below. A spreadsheet to help in the assessment has been developed to aid in the quantification step, and is available as part of this report. 6
7 Mapping DHS Capabilities on the IED Influence Diagram To understand the objectives of a capability, its interaction with other capabilities, potential elements and its costs we relied on the descriptions in the target capabilities list in the DHS Target Capabilities List (DHS 2007). 1. Common Mission Area Capabilities a. Planning: Planning supports all agencies and it defines the process by which agencies will prioritize, coordinate, manage and support personnel, information, equipment and resources to prevent, protect and mitigate against, respond to and recover from catastrophic events. Mapping is presented in Figure 2. Before and event occurs, to ensure that resources are allocated efficiently through the use of updated and best available information; after an event occurs, redistribution of the resources through defining processes by which involved agencies interact and exchange resources. Planning may not require extensive investments initially. There is a definite periodic component in the costs (personnel salaries, conducting trainings, investments in research and analysis). Planning also may not enforce significant behavioral changes in society. Figure 2: Planning Capability Interaction with IED Attack 7
8 b. Risk Management Risk management is defined by the Government Accountability Office as a continuous process of managing through a series of mitigating actions that permeate an entity s activities the likelihood of an adverse event and its negative impact. Mapping is presented in Figure 3. Timely identification and assessment of risks with the purpose of developing efficient and dynamic protect, prevent and mitigate strategies. Risk Management entails potential initial cost in recruitment and training of personnel. Significant costs in operations and management owing to the dynamic nature of capability. It may be susceptible to some changes in behavior of the society. Figure 3: Risk Management Capability Interaction with IED Attack 8
9 c. Community Preparedness and Participation: The Community Preparedness and Participation capability provides that everyone in America is fully aware, trained and practiced on how to prevent, protect/mitigate, prepare for and respond to all threats and hazards. Mapping presented in Figure 4. Provide mechanisms for efficient community involvement in all mission areas (Prevent, Protect, Respond and Recover). Possibly low initial monetary costs. Periodic costs in training and development. Moderate to high social costs since it may involve a degree of change in society s behavior. Figure 4: Community Preparedness Capability Interaction with IED Attack 9
10 d. Intelligence Information Sharing and Dissemination: The intelligence and information sharing and dissemination capability provides necessary tools to enable efficient prevention, protection, response and recovery activities. It is the multijurisdictional, multi-disciplinary exchange and dissemination of information and intelligence among the Federal, State, local and tribal layers of government. Timely sharing of information and intelligence across organizational/jurisdictional boundaries. Initial costs in establishing mechanisms, centers. Operation costs in update tools and methods. Social costs possibly low. Figure 5: Intelligence Information Sharing and Dissemination Capability Interaction with IED Attack 10
11 2. Prevent Area Capabilities a. Information Gathering and Recognition of Indicators and Warnings: This capability entails the gathering, consolidation and retention of raw data and information from sources to include human sources, observations, technical sources and open materials. Locally gathered information on suspicious activity is gathered and analyzed for credibility or need for action. Initial costs developing mechanisms to gather raw data Operations costs data analysis, update of mechanisms Social costs potentially low Figure 6: Information Gathering and Recognition of Warnings and Indicators Capability Interaction with IED Attack 11
12 b. Intelligence Analysis and Production: Intelligence analysis and production is the merging of data and information for the purpose of analyzing, linking and disseminating timely and actionable intelligence with an emphasis on the larger public safety and homeland security threat picture. This process focuses on the consolidation of analytical products among the intelligence analysis units at the Federal, State, local and tribal levels for tactical, operational and strategic use. Timely production of intelligence products for use in Prevent, Protect, Respond and Recover operations. Initial: Setting up facility and resources Operations: Update of facilities, mechanisms Social: Possibly low Figure 7: Intelligence Analysis and Production Capability Interaction with IED Attack 12
13 c. Counter-Terror Investigation and Law Enforcement: Counter-Terror Investigation and Law Enforcement is the capability that includes the broad range of activities undertaken by law enforcement and related entities to detect, examine, probe, investigate and conduct operations related to potential terrorist activities. Current and emerging investigative techniques are used with an emphasis on training, legal frameworks, recognition of indicators and warnings, source development, interdiction and related issues specific to antiterrorism activities. Suspects involved in criminal activities related to homeland security are successfully deterred, detected, disrupted, investigated and apprehended. Initial: Technology and methods Operations: Use and Update Social: Arguably Medium to High Figure 8: Counter Terror Investigation and Law Enforcement Capability Interaction with IED Attack 13
14 d. CBRNE Detection: Provides the ability to detect CBRNE materials at points of manufacture, transport and use. Includes detection of CBRNE material through area monitoring but not through their effects on humans or animals. It also includes development and adoption of technology. CBRNE materials are rapidly detected and characterized at critical locations. Initial: Arguably moderate to high Operations: Operations costs would mirror initial costs Social costs: Possibly moderate Figure 9: CBRNE Detection Capability Interaction with IED Attack 14
15 3. Prevent Area Capabilities a. Critical Infrastructure Protection: The Critical Infrastructure Protection capability enables public and private entities to identify, assess, prioritize and protect critical infrastructure and key resources so they can detect, prevent, deter, devalue and mitigate deliberate efforts to destroy, incapacitate or exploit critical infrastructure and key resources. Reduce risks to critical infrastructure through combination of prioritization, assessment and identification programs. Initial: Possibly medium high Operations: Medium high Social: Medium high Figure 10: Critical Infrastructure Protection Capability Interaction with IED Attack 15
16 4. Respond Mission Area a. Onsite Incident Management Onsite Incident Management is the capability to effectively direct and control incident activities by using the Incident Command System (ICS) consistent with the National Incident Management System (NIMS). Effective and efficient management of an incident through the Incident Command System (ICS) Initial costs developing plan, recruiting personnel. Operations costs Training, plan update. Social costs possibly none Figure 11: Onsite Incident Management Capability Interaction with IED Attack 16
17 b. Emergency Operations Center Management: Emergency Operations Center (EOC) Management is the capability to provide multi-agency coordination for incident management by activating and operating an EOC for a pre-planned or no-notice event. To provide effective coordination between agencies during an event Initial costs involve development of plan and systems, operations and maintenance costs would consist of training and costs to update systems and plans. Social costs are potentially low. Figure 12: Emergency Operations Center Management 17
18 c. Critical Resource Logistics and Distribution: Critical Resource Logistics and Distribution is the capability to identify, inventory, dispatch, mobilize, transport, recover and demobilize and to accurately track and record available human and material critical resources throughout all incident management phases. Critical resources are those necessary to preserve life property, safety and security. Effectively and efficiently move resources between both response and recovery groups. Initial Plan and Systems Development Operations and Maintenance: Plan update, Training Social Costs Possibly None Figure 13: Critical Resource Logistics and Distribution Capability Interaction with IED Attack 18
19 d. Volunteer and Donations Management: Volunteer Management and Donations is the capability to effectively coordinate use of volunteers and donations in support of domestic incident management Maximize the augmenting effect of voluntary support on response and recovery operations Initial costs: Plan and systems development Operations and maintenance: Plan update, training Social costs Possibly none Figure 14: Volunteer and Donations Management Capability Interaction with IED Attack 19
20 e. Responder Safety and Health: Responder Safety and Health is the capability that ensures adequate trained and equipped personnel and resources are available at the time of an incident to protect the safety and health of on scene first responders, hospital/medical facility personnel and skilled support personnel through the creation and maintenance of an effective safety and health program. Prevent all injuries to response and recovery personnel Initial Plan and systems development Operations and Maintenance: Plan update, training Social Costs Possibly none Figure 15: Responder Safety and Health Capability Interaction with IED Attack 20
21 f. Emergency Public Safety and Security: Emergency Public Safety and Security Response is the capability to reduce the impact and consequences of an incident or a major event by securing the affected area, including crime /incident scene preservation issues as appropriate, safely diverting the public from hazards, providing security support to other response operations. Protect and assess the incident area, mitigate further public risks by controlling access Initial Plan and systems development Operations and Maintenance: Plan update, training Social Costs Possibly None Figure 16: Emergency Public Safety and Security Capability Interaction with IED Attack 21
22 g. Environmental Health Environmental Health describes the capability to protect the public from environmental hazards and manage the health effects of an environmental health emergency on the public. The capability minimizes human exposure to environmental public health hazards. Rapid identification of environmental public health hazards and protection measures to at risk population Initial Plan and systems development Operations and Maintenance: Plan update, training Social Costs Possibly none Figure 17: Environmental Health Capability Interaction with IED Attack 22
23 h. Explosive Device Response Operations: Explosive Device Response Operations is the capability to coordinate, direct, and conduct improvised explosive device (IED) response after initial alert and notification. Coordinate intelligence fusion and analysis, information collection, and threat recognition, assess the situation and conduct appropriate Render Safe Procedures (RSP). Conduct searches for additional devices and coordinate overall efforts to mitigate chemical, biological, radiological, nuclear, and explosive (CBRNE) threat to the incident site. Threat assessments are conducted, the explosive and/or hazardous devices are rendered safe, and the area is cleared of hazards. Measures are implemented in the following priority order: ensure public safety; safeguard the officers on the scene (including the bomb technician); collect and preserve evidence; protect and preserve public and private property; and restore public services. Initial: Development of plans, mechanisms Operations: Training and update Social: Possibly low Figure 18: Explosive Device Response Operations 23
24 i. Fire Incident Response Support: This capability provides coordination and implementation of fire suppression operations, which include the following tasks: assessing the scene, assigning resources, establishing an incident command system (ICS) consistent with the National Incident Management System (NIMS), communicating the status of the situation, requesting additional resources, establishing a safe perimeter, evacuating persons in danger, rescuing trapped victims, conducting fire suppression, determining the cause of the fire(s), and ensuring the area is left in a safe condition. This capability further includes support necessary to prepare the community and reduce vulnerabilities in the event of a major event. Dispatch and safe arrival of the initial fire suppression resources occur within jurisdictional response time objectives. The first unit to arrive initiates the Incident Command System (ICS), assesses the incident scene, communicates the situation, and requests appropriate resources including any necessary mutual aid or cross-discipline support. Firefighting activities are conducted safely and fire hazards are contained, controlled, extinguished, and investigated, and the incident is managed in accordance with emergency response plans and procedures. Initial: Development of plans, mechanisms, facilities Operations: Training and update Social: Possibly low Figure 19: Fire Incident Response Support Capability Interaction with IED Attack 24
25 j. Citizen Evacuation and Shelter-In-Place Citizen Evacuation and shelter-in-place is the capability to prepare for, ensure communication of and immediately execute the safe and effective sheltering in place of an at risk population. It also includes managed evacuation to safe location in response to a potential or actual dangerous environment. Overall objective: Affected populations are safely sheltered-in-place or evacuated to a safe area Initial Plan and systems development Operations and Maintenance: Plan update, training Social Costs Possibly none Figure 20: Citizen Evacuation and Shelter-In-Place Capability Interaction with IED Attack 25
26 k. Search and Rescue Search and Rescue is the capability to coordinate and conduct search and rescue response efforts for all hazards, including searching affected areas for victims and locating, accessing, medically stabilizing and extricating victims from the damaged area. Maximize the number of victims saved in shortest possible time while maintaining rescuer safety Initial Plan and systems development Operations and Maintenance: Plan update, training Social Costs Possibly none Figure 21: Search and Rescue Capability Interaction with IED Capability 26
27 l. Emergency Public Information and Warning: The Emergency Public Information and Warning capability included public information, alert/warning and notification. It involves developing, coordinating, and disseminating information to the public, coordinating officials and incident management and responders across all jurisdictions and disciplines effectively under all hazard conditions. Transmission of coordinated, prompt and useful information to all concerned parties Initial Plan and systems development Operations and Maintenance: Plan update, training Social Costs Possibly None Figure 22: Emergency Public Information and Warning Capability Interaction with IED Capability 27
28 m. Emergency Triage and Pre-Hospitalization Treatment: Emergency Triage and Pre-Hospital Treatment is the capability to appropriately dispatch emergency medical services (EMS) resources; to provide feasible, suitable, and medically acceptable pre-hospital triage and treatment of patients; to provide transport as well as medical care en-route to an appropriate receiving facility; and to track patients to a treatment facility. Emergency Medical Services (EMS) resources are effectively and appropriately dispatched and provide pre-hospital triage, treatment, transport, tracking of patients, and documentation of care appropriate for the incident, while maintaining the capabilities of the EMS system for continued operations. Initial: Development of plans and mechanisms Operations: Training and update Social costs: Possibly low Figure 23: Emergency Triage and Pre-Hospital Treatment Capability Interaction with IED Attack 28
29 n. Medical Surge: Medical surge is defined as the rapid expansion of the capacity of the existing healthcare system in response to an event that results in increased need of personnel, support functions, physical space and logistical support. Provide expanded healthcare capacity for event without significantly altering capacity for routine healthcare. Initial Plan and systems development, building spare capacity Operations and Maintenance: Plan update, training, maintaining spare capacity Social Costs Possibly none Figure 24: Medical Surge Capability Interaction with IED Attack 29
30 o. Medical Supplies Management and Distribution Medical Supplies Management and Distribution is the capability to procure and maintain pharmaceuticals and medical materials prior to an incident and to transport, distribute and track these materials during an incident. Availability of medical supplies at the event site in a timely manner. Initial Plan and systems development Operations and Maintenance: Plan update, training Social Costs Possibly none Figure 25: Medical Supplies Management and Distribution Capability Interaction with IED Attack 30
31 p. Mass Care: Mass Care is the capability to provide immediate shelter, feeding centers, basic first aid, bulk distribution of needed items and related services to persons affected by a large scale incident. Mass Care is usually provided by Non Government Organizations or local governments. Mass Care services including sheltering, feeding and bulk distribution are rapidly provided for the population and companion animals within the affected areas. Initial Development of plans, mechanisms Operations: Training and update Social costs: Potentially low Figure 26: Mass Care Capability Interaction with IED Attack 31
32 q. Fatality Management: Fatality Management is the capability to effectively perform scene documentation, the complete collection and recovery of the dead, victim s personal effects and items of evidence, decontamination remains. Complete and rapid removal of human remains, decontamination of remains and site. Initial Development of plans and mechanisms Operations: Training and update Social: Possibly low Figure 27: Fatality Management Capability Interaction with IED Attack 32
33 4. Recover Mission Area: a. Structural Damage Assessment: Structural Damage Assessment is the capability to conduct damage and safety assessments of civil, commercial and residential infrastructure and to perform structural inspections and mitigation activities. Accurate situation needs and damage assessments. Initial: Development of plans and mechanisms Operations: Training and update Social: Possibly low Figure 28: Structural Damage Assessment Capability Interaction with IED Attack 33
34 b. Restoration of Lifelines Restoration of Lifelines is the capability to initiate and sustain restoration activities. This includes facilitating the repair/replacement of infrastructure for oil, gas, electric, telecommunications, drinking water, wastewater and transportation services. Lifelines to undertake sustainable response and recovery activities are established. Initial: Development of plans, facilities and mechanisms Operations: Maintenance of infrastructure, update Social: Possibly low Figure 29: Restoration of Lifelines Capability Interaction with IED Attack 34
35 c. Economic and Community Recovery: Economic and Community Recovery is the capability to implement short and long term recovery and mitigation processes after an incident. This will include identifying the extent of damage caused by an incident, conducting thorough post event assessments and determining and providing the support needed for recovery and restoration activities to minimize future loss from a similar event. Economic Impact is estimated with the goal of establishing priorities for recovery; business disruption is minimized and population is provided with appropriate levels of relief with minimal delay. Initial: Development of plans and mechanisms Operations: Update and Training Social: Possibly low Figure 30: Economic and Community Recovery Capability Interaction with IED Attack 35
36 Assessing the Capabilities After mapping the capabilities on the IED Attack diagram, assessing the effectiveness and cost of capabilities was conducted using the following rules and judgments. Effectiveness Scores The Effectiveness Score (ES) of a Capability consists of four components. The first component is the assessment of the Capability against the effectiveness criteria. A Capability is assessed as high, medium or low against each of the effectiveness criteria. The spreadsheet is set up to count the number of high (#HE), medium (#ME) or low (#LE) scores the Capability receives from an expert. These are reported in columns O, P and Q respectively in the spreadsheet labeled Assessment. The second component is the relative importance of a high, medium or low assessment. The expert provides input on the relative significance of a high (whe), medium (wme) or low score (wle). This input is obtained from the expert using slider controls in rows 26 and 27 of the spreadsheet labeled Control & Results. The sum of significance scores (High+ Medium + Low) is set up to be 100. Most capabilities do not operate independently and rely on effective functioning of certain other capabilities. An expert using the spreadsheet is required to input number of other capabilities the Capability being assessed relies upon (#O). This input is obtained in column W of the spreadsheet labeled Assessment. To assist the expert in making this assessment, the influence diagram represents the interaction of the Capability with other capabilities. The fourth and the final component of the Effectiveness Score is % reduction (R) in effectiveness by reliance on single another capability. This input is obtained on the Control & Results sheet using slider controls on row 31. Based on these four components the Effectiveness Score can be calculated as: ES 1 = (#HE*wHE + #ME*wME + #LE*wLE)*(1-R) #O The highest possible score for a Capability is thus 900. (9 (# Effectiveness parameters) x 100 (Weight of a High Assessment) and 0 reliance) 1 To each Effectiveness Score a random number between 0 and 0.01 is added. This random number helps in breaking ties between Capabilities when they are ranked according to Effectiveness Scores. It is for this reason that the list of Top 6 Capabilities is included in the results sheet, since some Capabilities may be very close in their scores. 36
37 Cost Scores The Cost Score (CS) of a Capability also consists of four components. The first component is the assessment of the Capability against the cost criteria. A Capability is assessed as high, medium or low against each of the cost criteria (high meaning high cost). The spreadsheet is set up to count the number of high (#HC), medium (#MC) or low (#LC) scores the Capability receives from an expert. These are reported in columns R, S and T respectively in the spreadsheet labeled Assessment. The second component is the relative importance of a high, medium or low assessment. The expert also provides input on the relative significance of a high (whc), medium (wmc) or low score (wlc). This input is obtained from the expert using slider controls in rows 29 and 30 of the spreadsheet labeled Control & Results. The sum of significance scores (High+ Medium + Low) is setup to be 100. The third component is number of other capabilities the Capability being assessed relies upon (#O). Most capabilities do not operate independently and rely on effective functioning of certain other capabilities. An expert using the spreadsheet is required to input number of other capabilities the Capability being assessed relies upon. This input is obtained in column W of the spreadsheet labeled Assessment. To assist the expert in making this assessment, the influence diagram represents the interaction of the Capability with other capabilities. The fourth and the final component of the Cost Score is % increase (I) in costs by reliance on single additional capability. This input is obtained on the Control & Results sheet using slider controls on row 32. Based on these four components the Effectiveness Score can be calculated as: CS 2 = (#HC*wHC + #MC*wMC + #LC*wLC)/(1+I) #O The highest possible Cost Score of a Capability is thus 400. (4 (# Cost criteria) x 100 (Weight of Low Assessment), 0 reliance) Cost-Effectiveness Score The cost-effectiveness score is the ratio of the effectiveness score divided by the cost score and multiplied by 10. It provides an indication of the overall value of a target capability. 2 To each Cost Score a random number between 0 and 0.01 is added. This random number helps in breaking ties between Capabilities when they are ranked according to Cost Scores. It is for this reason that the list of Top 6 Capabilities is included in the results sheet, since some Capabilities may be very close in their scores. 37
38 References Clemen, R. T., & Reilly, T. (1996). Making Hard Decisions. Belmont, CA: Duxbury (second edition). DFI Government Services Homeland Security Strategy & Policy Group. National Planning Scenarios. Wahsington DC, 2006a. DFI Government Services Homeland Security Strategy & Policy Group. National Planning Scenario 12: Explosives Attack Bombing using Improvised Explosive Devices, version 3. Wahsington DC, 2006b. U.S. Department of Homeland Security. Target Capabilities List: A companion to the National Preparedness Guidelines. Washington DC,
39 Figure 31: Qualitative Assessment of Target Capabilities and Aggregate Cost and Effectiveness Scores (Please Refer to Accompanying EXCEL Spreadsheet) 39
National Preparedness Guidelines
National Preparedness Guidelines September 2007 THIS PAGE INTENTIONALLY LEFT BLANK ii PREFACE President Bush has led a committed effort to strengthen the Nation s preparedness capabilities. The national
More informationTEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
More informationON-SITE INCIDENT MANAGEMENT
ON-SITE INCIDENT MANAGEMENT Capability Definition Onsite Incident is the capability to effectively direct and control incident activities by using the Incident Command System (ICS) consistent with the
More informationB E F O R E T H E E M E R G E N C Y
B E F O R E T H E E M E R G E N C Y RESPONSIBILITY / LIABILITY for Homeland Security / Emergency Management Duty of Care - Counties and Cities ARE responsible for the safety of their citizens. Following
More informationFlooding Emergency Response Exercise
Flooding Emergency Response Exercise James Woodward, Senior Exercise Planner California Emergency Management Agency 3650 Schriever Ave. Mather, CA 95655 Cell: (916) 439-3546 Email: james.woodward@calema.ca.gov
More informationUFF Position Statement: Fire and Smoke as a Weapon
UFF Position Statement: Fire and Smoke as a Weapon According to the United States Department of Homeland Security, international terrorist groups and violent extremists have shown interest in using fire
More informationProject Management Plan
Project Management Plan FY 2009 UASI Project Information Project Title Subgrantee Subgrant GIS Data Exchange District of Columbia [to be generated by SAA] Subgrant Award $600,000.00 Jurisdiction (if applicable)
More informationAn ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission
An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright
More informationOhio Homeland Security Strategic Plan 2013-2016
GOAL 1 Strengthen Ohio s intelligence and information sharing system for the detection and prevention of threats to public safety. Objective 1.1 Support continued development of the information sharing
More informationUNION COLLEGE INCIDENT RESPONSE PLAN
UNION COLLEGE INCIDENT RESPONSE PLAN The college is committed to supporting the safety and welfare of all its students, faculty, staff and visitors. It also consists of academic, research and other facilities,
More informationU.S. Fire Administration. The Critical Infrastructure Protection Process Job Aid
U.S. Fire Administration The Critical Infrastructure Protection Process Job Aid Emergency Management and Response- Information Sharing and Analysis Center FA-313 2nd Edition: August 2007 Table of Contents
More informationVirgin Islands Territorial Emergency Management Agency. Territorial Homeland Security Strategy 2011-2014
Virgin Islands Territorial Emergency Management Agency Territorial Homeland Security Strategy 2011-2014 Prepared for: Point of Contact: Noel Smith Deputy Director Virgin Islands Territorial Emergency Management
More informationTraining Opportunities
FEMA Independent Study Courses IS-288.A: The Role of Voluntary Organizations in Emergency Management To complete the above course please visit the FEMA Independent Study Website at: http://training.fema.gov/is
More informationMAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0
MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:
More informationFEDERAL EMERGENCY MANAGEMENT AGENCY (FEMA) INDEPENDENT STUDY COURSE INTRO TO INCIDENT COMMAND SYSTEM FOR FEDERAL WORKERS (IS-100.
This Study Guide has been created to provide an overview of the course content presented in the Federal Emergency Management Agency (FEMA) Independent Study Course titled IS-100.FWA Intro to Incident Command
More informationNEBRASKA STATE HOMELAND SECURITY STRATEGY
NEBRASKA STATE HOMELAND SECURITY STRATEGY 2014-2016 Nebraska Homeland Security Policy Group/Senior Advisory Council This document provides an overall framework for what the State of Nebraska hopes to achieve
More informationThe Commonwealth of Massachusetts State Homeland Security Strategy
The Commonwealth of Massachusetts State Homeland Security Strategy Massachusetts Executive Office of Public Safety and Security December 2014 The Commonwealth of Massachusetts Executive Office of Public
More informationMaryland Emergency Operations Plan
Maryland Emergency Operations Plan Purpose The purpose of the Maryland Emergency Operations Plan (EOP) is to outline an approach and designate responsibilities intended to minimize the consequences of
More informationRelationship to National Response Plan Emergency Support Function (ESF)/Annex
RISK MANAGEMENT Capability Definition Risk Management is defined by the Government Accountability Office (GAO) as A continuous process of managing through a series of mitigating actions that permeate an
More informationNIMS Study Guide. Lesson One: What Is the National Incident Management System (NIMS)? What is NIMS?
NIMS Study Guide Lesson One: What Is the National Incident Management System (NIMS)? What is NIMS? NIMS is a comprehensive, national approach to incident management that is applicable at all jurisdictional
More informationPurpose of the Governor s strategy. Guiding Principles
Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose
More informationEmergency Management Standard
Emergency Management Standard Emergency Management Accreditation Program Publication Note The Emergency Management Standard by the Emergency Management Accreditation Program (EMAP) is designed as a tool
More informationMONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN. ESF14-Long Term Community Recovery
MONTGOMERY COUNTY, KANSAS EMERGENCY OPERATIONS PLAN ESF14-Long Term Community Recovery Planning Team Support Agency Coffeyville Public Works Independence Public Works Montgomery County Public Works 1/15/2009
More informationSTATE HOMELAND SECURITY GRANT PROGRAM
FY2015 State Homeland Security Investment Justifications STATE HOMELAND SECURITY GRANT PROGRAM OREGON OFFICE OF EMERGENCY MANAGEMENT www.oregon.gov/omd/oem Mailing address: P.O. Box 14370 Salem, OR 97309-5062
More informationTable of Contents ESF-3-1 034-00-13
Table of Contents Primary Coordinating Agency... 2 Local Supporting Agencies... 2 State, Regional, and Federal Agencies and Organizations... 3 Purpose... 3 Situations and Assumptions... 4 Direction and
More informationFY07 Homeland Security Grants. Dallas City Council Public Safety Committee Briefing November 19, 2007
FY07 Homeland Security Grants Dallas City Council Public Safety Committee Briefing November 19, 2007 Purpose Give an overview of the Homeland Security Grant Program (HSGP) Highlight City of Dallas projects
More informationHospital Emergency Operations Plan
Hospital Emergency Operations Plan I-1 Emergency Management Plan I PURPOSE The mission of University Hospital of Brooklyn (UHB) is to improve the health of the people of Kings County by providing cost-effective,
More informationTable of Contents ESF-12-1 034-00-13
Table of Contents Primary Coordinating Agency... 2 Local Supporting Agencies... 2 State, Regional, and Federal Agencies and Organizations... 2 Purpose... 3 Situations and Assumptions... 4 Direction and
More information2015 Emergency Management Course Schedule
2015 Emergency Management Course Schedule NOTE: ALL COURSES WILL NOW BE OFFERED AT THE CENTER FOR LEARNING AND INNOVATION 1979 MARCUS AVE. LAKE SUCCESS, NY 11042 EXCEPT WHERE NOTED HazMat for Healthcare
More informationIntroduction. Catastrophic Incident Annex. Cooperating Agencies: Coordinating Agency: Department of Homeland Security
Catastrophic Incident Annex Coordinating Agency: Department of Homeland Security Cooperating Agencies: All Federal departments and agencies (and other organizations) with assigned primary or supporting
More informationMass Gatherings Medical Strategies for Weapons of Mass Destruction
Mass Gatherings Medical Strategies for Weapons of Mass Destruction Kristi L. Koenig, MD, FACEP Professor of Clinical Emergency Medicine Director of Public Health Preparedness Co-Director, EMS and Disaster
More informationState of Ohio Homeland Security STRATEGIC PLAN
State of Ohio Homeland Security 2011 Contents Introduction... 1 Mission Areas... 2 Goals... 3 Appendix A. Roundtable Advisory Committees... 14 Appendix B. Homeland Security Advisory Council... 17 Appendix
More informationOREGON STATE UNIVERSITY MASTER EMERGENCY MANAGEMENT PLAN
OREGON STATE UNIVERSITY MASTER EMERGENCY MANAGEMENT PLAN Last Edit 2/8/2011 OVERVIEW This document provides a management framework for responding to incidents that may threaten the health and safety of
More informationEMERGENCY MANAGEMENT ORGANIZATION
VI. EMERGENCY MANAGEMENT ORGANIZATION General 1. The overall responsibility for emergency preparedness rests with government on all levels, including all agencies of state, county and city in coordination
More informationUNIVERSITY OF INDIANAPOLIS COMPREHENSIVE EMERGENCY MANAGEMENT PLAN. Emergency Planning Guidelines for the University of Indianapolis
UNIVERSITY OF INDIANAPOLIS COMPREHENSIVE EMERGENCY MANAGEMENT PLAN Emergency Planning Guidelines for the University of Indianapolis February 2016 THIS PAGE INTENTIONALLY BLANK Letter of Promulgation University
More informationMANAGEMENT OF THE INVESTIGATION PROCESS AT MAJOR INCIDENTS
MANAGEMENT OF THE INVESTIGATION PROCESS AT MAJOR INCIDENTS Ronald L. Hopkins, CFPS, CFEI Eastern Kentucky University, USA ABSTRACT The goal of any fire or explosion investigation is to determine the origin,
More informationThe Role of Elected Officials During Disasters. The Florida Division of Emergency Management
The Role of Elected Officials During Disasters The Florida Division of Emergency Management Bryan W. Koon Director Florida Division of Emergency Management Introduction Florida s elected officials play
More informationSTATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 220 DISASTER MANAGEMENT AND PREPAREDNESS
STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 220 DISASTER MANAGEMENT AND PREPAREDNESS Prepared By: Dr. Michael J. O Connor Jr. SCHOOL OF BUSINSS AND LIBERAL ARTS
More informationLAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN ESF-13
LAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN LAW ENFORCEMENT AND SECURITY ESF-13 Coordinates and organizes law enforcement and security resources in preparing for, responding to and recovering from
More informationMODULE III PLANNING &TRIAGE
MODULE III PLANNING &TRIAGE PLANNING By failing to prepare, you are preparing to fail Benjamin Franklin OBJECTIVES Discuss the components of disaster planning Review the levels of planning Discuss the
More informationFor Official Use Only. Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan 2016-2018 (TEP) July 27, 2015. For Official Use Only
For Official Use Only Springfield-Greene County, Missouri Multi-Year Training and Exercise Plan 2016-2018 (TEP) July 27, 2015 For Official Use Only SPRINGFIELD-GREENE COUNTY Point of Contact Erin Pope
More informationDraft 8/1/05 SYSTEM First Rev. 8/9/05 2 nd Rev. 8/30/05 EMERGENCY OPERATIONS PLAN
Draft 8/1/05 SYSTEM First Rev. 8/9/05 2 nd Rev. 8/30/05 EMERGENCY OPERATIONS PLAN I. INTRODUCTION A. PURPOSE - The University of Hawaii System Emergency Operations Plan (EOP) provides procedures for managing
More informationDepartment of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process
Department of Homeland Security Office for Domestic Preparedness Campus Preparedness Assessment Process Campus Preparedness Assessment-Overview Purpose of the CPA Elements of the CPA How to use the CPA
More informationCBO. Federal Funding for Homeland Security: An Update. What Is Homeland Security?
CBO A series of issue summaries from the Congressional Budget Office JULY 20, 2005 Federal Funding for Homeland Security: An Update The terrorist attacks of September 11, 2001, heightened Congressional
More informationNIMS ICS 100.HCb. Instructions
NIMS ICS 100.HCb Instructions This packet contains the NIMS 100 Study Guide and the Test Questions for the NIMS 100 final exam. Please review the Study Guide. Next, take the paper test - record your answers
More informationWestern Washington University Basic Plan 2013. A part of Western s Comprehensive Emergency Management Plan
2013 A part of Western s Record of Changes Change # Date Entered Description and Location of Change(s) Person making changes 2 1. PURPOSE, SCOPE, SITUATION OVERVIEW, ASSUMPTIONS AND LIMITATIONS A. PURPOSE
More informationPreparedness in the Southwest
Preparedness in the Southwest Risk Assessment and Hazard Vulnerability Developed by The Arizona Center for Public Health Preparedness Cover Art www.azcphp.publichealth.arizona.edu Chapter 1 Importance
More informationPlan Development and Review Guidance for local Emergency Operations Plans
Nancy J. Dragani, Executive Director Ohio Emergency Management Agency 2855 West Dublin-Granville Road Columbus, Ohio 43235-2206 www.ema.ohio.gov Plan Development and Review Guidance for local Emergency
More informationCITY OF KENT, WASHINGTON COMPREHENSIVE EMERGENCY MANAGEMENT PLAN APPENDIX 3 REFERENCES
CITY OF KENT, WASHINGTON COMPREHENSIVE EMERGENCY MANAGEMENT PLAN APPENDIX 3 REFERENCES The City of Kent Comprehensive Emergency Management Plan was developed and is maintained pursuant to, but not limited
More informationLesson 1: What Is the National Incident Management System (NIMS)? Summary of Lesson Content
Lesson 1: What Is the National Incident Management System (NIMS)? Lesson Overview On February 28, 2003, President Bush issued Homeland Security Presidential Directive 5. HSPD 5 directed the Secretary of
More informationThe Bay Area Homeland Security Strategy and Implementation Plan 2012 2015
The Bay Area Homeland Security Strategy and Implementation Plan 2012 2015 October 2013 Table of Contents STRATEGY SUMMARY... 1 INTRODUCTION... 16 1.1 BACKGROUND... 16 1.2 BAY AREA OVERVIEW... 16 1.3 BAY
More informationEstablishing A Secure & Resilient Water Sector. Overview. Legislative Drivers
Establishing A Secure & Resilient Water Sector December 14-15, 2010 LWQTC Overview Key Drivers Legislation Presidential Directives AWWA & Sector Initiatives Standards & Guidance Mutual Aid & Assistance
More informationWalla Walla County CEMP BASIC PLAN
BASIC PLAN I. INTRODUCTION A. Mission Coordinate and facilitate resources to minimize the impacts of disasters and emergencies on people, property, the environment and the economy of Walla Walla County.
More informationPublic Works Job Titles
Public Works Job Titles The Public Works (PW) Working Group determined the following job titles to be the most commonly requested PW personnel in an interstate, mutual-aid-based response: PW Job Title
More informationTraining Courses Catalog 2015
Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction
More informationThe Strategic Importance, Causes and Consequences of Terrorism
The Strategic Importance, Causes and Consequences of Terrorism How Terrorism Research Can Inform Policy Responses Todd Stewart, Ph.D. Major General, United States Air Force (Retired) Director, Program
More informationPUBLIC SAFETY FIRE. Functional Coordinator: Fire Chiefs
Option for Public Safety or Tasks can be combined with Law Enforcement depending on jurisdiction PUBLIC SAFETY FIRE Functional Coordinator: Fire Chiefs Purpose This function provides procedures for preparedness,
More informationThreat and Hazard Identification and Risk Assessment
Threat and Hazard Identification and Risk Assessment Background/Overview and Process Briefing Homeland Security Preparedness Technical Assistance Program May 2012 PPD-8 Background A linking together of
More informationState Homeland Security Strategy (2012)
Section 1 > Introduction Purpose The purpose of the State Homeland Security Strategy (SHSS) is to identify statewide whole community priorities to achieve and sustain a strengthened ability to prevent,
More informationUniversity of San Francisco EMERGENCY OPERATIONS PLAN
University of San Francisco EMERGENCY OPERATIONS PLAN University of San Francisco Emergency Operations Plan Plan Contact Eric Giardini Director of Campus Resilience 415-422-4222 This plan complies with
More informationHow To Write A Book On Risk Management
National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California,
More informationAlabama Radiological Emergency Preparedness Plan
Alabama Radiological Emergency Preparedness Plan Emergency Support Function (ESF) #1 - Transportation Primary Support Agency: Support Agencies: Secondary Agencies: Transportation Public Safety Military
More informationSubject: National Preparedness
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-8 Subject: National Preparedness Purpose (1) This directive establishes
More informationPlanning & Response Considerations for Mass Shooting Incidents
Planning & Response Considerations for Mass Shooting Incidents This PDF is a variety of slides from my 4-hour Multi-Agency Mass Shootings Planning & Response Course May 2008 version. I developed this PDF
More informationHomeland Security and Protective Services CIP 43.9999 Task Grid
1 Secondary Task List 100 EXPLAIN AND PERFORM SAFETY PROCEDURES 101 Demonstrate knowledge of the rules of conduct for the school and classroom. 102 Identify safety and standard operation procedures. 103
More informationv. 03/03/2015 Page ii
The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course
More informationEssential Components of Emergency Management Plans at Community Health Centers Crosswalk of Plan Elements
Plan Components Health centers will have an emergency management plan Plan and organization are NIMS compliant Bureau of Primary Health Care Policy Information Notice 2007-15 Plans and procedures for emergency
More informationChapter 7. Response & Recovery. 9/11 Response. 9/11 Response (cont.) Chapter 7 Response and Recovery Fall 2007. Introduction to Homeland Security
Introduction to Homeland Security Chapter 7 Response & Recovery 9/11 Response The 9/11 and anthrax attacks exposed weaknesses in the US interagency response system, outside of regular operations There
More informationAct 833 Course Descriptions of Approved Training Classes for Credit Hours Offered Online, In House, Other Organizations, or by the ADEM.
Act 833 Course Descriptions of Approved Training Classes for Credit Hours Offered Online, In House, Other Organizations, or by the ADEM. G-110 Emergency Management Operations. (20 Hours Credit) The EMOC
More informationOverview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements
Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements Jim Weldin Delaware League of Local Governments 1 Homeland Security Grant Funding
More informationMaricopa County Emergency Management
Maricopa County Emergency Management Mission Provide community-wide education, planning, coordination, and continuity of government for the people of Maricopa County in order to protect lives, property
More informationBASIC EMERGENCY MANAGEMENT FOR ELECTED OFFICIALS. M a r y l a n d M a y o r s A s s o c i a t i o n. W i n t e r C o n f e r e n c e A n n a p o l i s
BASIC EMERGENCY MANAGEMENT FOR ELECTED OFFICIALS M a r y l a n d M a y o r s A s s o c i a t i o n W i n t e r C o n f e r e n c e A n n a p o l i s SPEAKERS Mayor Michael E. Bennett City of Aberdeen Mayor
More informationLarimer County Comprehensive Emergency Management Plan 2015
Larimer County Comprehensive Emergency Management Plan 2015 EMERGENCY SUPPORT FUNCTIONS Emergency Support Functions (ESFs) provide the structure for coordinating county activities in support of incident
More informationJay Grant AAPA Federal Lobbyist Director, Port Security Council
AAPA Security & Safety Seminar Jay Grant AAPA Federal Lobbyist Director, Port Security Council July 28, 2005 Port Security Council A legislative coalition established to serve as a single voice for the
More informationEmergency Operations Plan ANNEX K - UTILITIES RESTORATION ESF #3, #12 I. MNWALK REQUIREMENTS. Item #: 1, 4, 46, 53, 54
ANNEX K - UTILITIES RESTORATION ESF #3, #12 I. MNWALK REQUIREMENTS Item #: 1, 4, 46, 53, 54 II. PURPOSE The purpose of this annex is to describe the organization, operational concepts and responsibilities
More informationEl Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
More informationNational Preparedness Goal
National Preparedness Goal First Edition September 2011 Table of Contents Introduction... 1 Core Capabilities... 2 Overview...2 Risk and the Core Capabilities...3 Mission Area: Prevention...4 Mission
More informationSupplemental Tool: Executing A Critical Infrastructure Risk Management Approach
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Executing a Critical Infrastructure Risk Management Approach Risk is defined as the potential for an unwanted outcome resulting
More informationPage Administrative Summary...3 Introduction Comprehensive Approach Conclusion
TABLE OF CONTENTS Page Administrative Summary...3 Introduction Comprehensive Approach Conclusion PART 1: PLANNING General Considerations and Planning Guidelines... 4 Policy Group Oversight Committee Extended
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationOil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
More informationTHE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM
THE FEDERAL BUREAU OF INVESTIGATION S WEAPONS OF MASS DESTRUCTION COORDINATOR PROGRAM U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 09-36 September 2009 THE FEDERAL
More informationICS for LAUSD EOC and DOC Operation
ICS for LAUSD EOC and DOC Operation Below is some background information on the Incident Command System (used at our schools and in other field operations) and how it applies in an EOC environment. From
More informationSearch & Rescue Merit Badge
FEMA Course IS-100b Introduction to the Incident Command System for Search & Rescue Merit Badge Visual 1.1 Search & Rescue Merit Badge (requirement #5) Complete the training for ICS-100, Introduction to
More informationNational Capital Region: Urban Area Security Initiatives Subgrants as of 02/01/12
National Capital Region: Urban Area Initiatives Subgrants as of 02/01/12 Year Subgrantee Subgrant Name Award American Red Cross of the National Capital Area Mass Care (Maintenance) 146,258 American Red
More informationSubject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
More informationThis page intentionally left blank.
This page intentionally left blank. This page intentionally left blank. CONTENTS List of Tables...vii List of Figures...vii What Is the National Incident Management System?...1 PREFACE... 3 INTRODUCTION
More informationShort-term Recovery Strategy
Disaster Recovery Plan: Attachment A I. Overview Short-term recovery can best be defined as those actions, taken by responders, to address and provide for the essential and immediate needs of both the
More informationPreparedness is not an abstract concept. It is discrete, calculable (to a degree), and applicable to certain
HOMELAND SECURITY DISCIPLINES AND THE CYCLE OF PREPAREDNES William V. Pelfrey Preparedness is not an abstract concept. It is discrete, calculable (to a degree), and applicable to certain disciplines, organizations,
More informationSalem Community College Course Syllabus. Section I. Course Title: Principles of Emergency Management. Course Code: EME101.
Salem Community College Course Syllabus Section I Course Title: Principles of Emergency Management Course Code: EME101 Lecture Hours: 3 Lab Hours: 0 Credits: 3 Course Description: This is a three credit
More informationCapital Area Council of Governments FY 2015 Homeland Security Program Regional Grant Process
Capital Area Council of Governments FY 2015 Homeland Security Program Regional Grant Process General Information Texas uses a regional approach to the State Homeland Security Grant Program (HSGP), providing
More informationDecember 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
More informationNational Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee
National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword
More informationCONTINUITY OF OPERATIONS PLAN TEMPLATE
CONTINUITY OF OPERATIONS PLAN TEMPLATE For Long-Term Care Facilities CALIFORNIA ASSOCIATION OF HEALTH FACILITIES DISASTER PREPAREDNESS PROGRAM TABLE OF CONTENTS TABLE OF CONTENTS...2 SECTION 1: INTRODUCTION...3
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationEmergency Operations Plan Executive Summary
The City of Palmdale Emergency Operations Plan (EOP) was written in compliance with California s Standardized Emergency Management System (SEMS) and the National Incident Management System (NIMS) guidelines,
More informationSchool Safety & Emergency Preparedness. Presented by Dr. Joe Melita Professional Standards & Special Investigative Unit
School Safety & Emergency Preparedness Presented by Dr. Joe Melita Professional Standards & Special Investigative Unit Today s Agenda Today s session is designed to provide participants with an overview
More informationDRILL OF THE MONTH INSTRUCTOR GUIDE. Teaching/Learning Materials: LCD and laptop for PowerPoint slides
DRILL OF THE MONTH INSTRUCTOR GUIDE Title: CRIME / FIRE SCENE INVESTIGATION Time Required: 1-2 Hours Teaching/Learning Materials: LCD and laptop for PowerPoint slides References: Arson Detection for the
More informationSTATE OF MARYLAND Strategy for Homeland Security
STATE OF MARYLAND Strategy for Homeland Security Published June 2004 Governor s Office of Homeland Security Dennis R. Schrader, Director Robert L. Ehrlich, Jr. Governor Michael S. Steele Lt. Governor HOMELAND
More information