Disaster and Emergency Management

Slides:



Advertisements
Similar presentations
Department of Homeland Security Site Assistance Visit (SAV)
Advertisements

Emergency Management: An Overview
WMD Crime Scene Management
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
A Brief Overview of Emergency Management Office of Emergency Management April 2006 Prepared By: The Spartanburg County Office of Emergency Management.
Unit 1: Introductions and Course Overview Administrative Information  Daily schedule  Restroom locations  Breaks and lunch  Emergency exit routes 
Emergency Management Overview Kelly Rouba EAD & Associates, LLC April 22, Annual Conference of AT Act Programs.
OVERCOMING CHALLENGES IN EMERGENCY MANAGEMENT NAWIC May 2013.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
1 Continuity Planning for transportation agencies.
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Business Crisis and Continuity Management (BCCM) Class Session
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Part of a Broader Strategy
Role of Analysis in the Crime Prevention of Homeland Security Security Services.
CITIZEN CORPS & CERT ORGANIZATIONS. What is Citizen Corps? Following the tragic events that occurred on September 11, 2001, state and local government.
Homeland Security Advisory System protectivemeasures vulnerability responseFederal departments and agencies would implement a corresponding set of protective.
Introduction to the Public Safety System Created by Curt Harrell & Jesse Kuzy for.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Hazards and Disaster Management
Unit Objectives  Describe the types of hazards to which your community is vulnerable.  Describe the functions of CERTs.  Identify preparedness steps.
Agricultural Investigations Law Enforcement Perspective.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Bernards Township Office of Emergency Management February 28, 2012.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
IAFS 1000 Terrorism.
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
Created by: Ashley Spivey For Department of Homeland Security All information from:
Seminar 3 Homeland Security Civilians Terrorism v. Disaster
Boston – June 12 th. 2 Joe Rozek Microsoft Corporation.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Chapter 17: Foreign Policy and National Defense Section 2.
Disaster and Emergency Management Security Services.
Citizen Corps Volunteer for America “Engaging Citizens In Homeland Security”
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Chapter 13: Police Strategies and Tactics Seminar 8.
Week 4 Tina Mainwaring. VERY IMPORTANT!!! NO SEMINAR NEXT WEEK!!! NO SEMINAR NEXT WEEK!!! NO DISCUSSION BOARDS NEXT WEEK!! NO DISCUSSION BOARDS NEXT WEEK!!
Module 8 Risk Management. Manager, Customer Services Module 8Slide - 2 Objective The learner will be able to: –Develop an understanding of Security Responsibility.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Community Health Centers of Arkansas Hazard Vulnerability Assessment Workshop August 11, 2017 Mark Fuller.
Role of Analysis in the Crime Prevention of Homeland Security
Section V Getting the Job Done… Through Others
Joint Force Headquarters-Michigan CCIRs and PIRs
CONTINUITY OF OPERATIONS PLANNING WORKSHOP #2
Disaster Preparedness
Joint Force Headquarters-Michigan CCIRs and PIRs
Copyright © 2012, Elsevier Inc. All rights Reserved.
Disaster and Emergency Management
Chapter 13 Globalization and Terrorism: Our Small World
The U.S. Department of Homeland Security
Internet Vulnerabilities & Criminal Activity
Copyright © 2012, Elsevier Inc. All rights Reserved.
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
Preparing for a Terrorist Attack Indian Point Energy Center
Disaster Preparedness
Prevention, Intelligence
Warm Up – April 2 Answer the following question on a post it:
Unit 8 - Terrorism CERT Basic Training Unit 8
Criminal Investigations
THE USA’S NEW POLICY DIRECTIVE ON NATIONAL PREPAREDNESS
Presentation transcript:

Disaster and Emergency Management Security Services

What is Terrorism? Defining terrorism is difficult. Some options are: The systematic application of violence to promote or maintain a political or religious system. The unlawful use of force and violence against persons or property to intimidate or coerce a government, a civilian population, or any segment thereof, in furtherance of political or social objectives (Code of Federal Regulations).

What is Terrorism? The use of force or violence against persons or property in violation of criminal laws of the U.S. for purposes of intimidation, coercion, or ransom. Premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents.

Characteristics of Terrorist Groups Adapt as times change. Most are unsuccessful in their long-term goals. Work with other organizations, including organized crime groups, to finance activities and mobilize resources. Creative in their tactics – anything can happen.

How does the U.S. Address Terrorism? Developed the Department of Homeland Security (DHS) in 2003, consolidating 22 separate agencies under one unified organization. The first single, federal department with homeland security as its primary objective. DHS’ mission is to protect the American people and our way of life from terrorism. DHS’ expectations are to work to ensure the highest level of protection and preparedness for the country and its citizens through partnerships with state, local, and tribal governments and the private sector.

How does the U.S. Address Terrorism? Passed the Homeland Security Act (HLS) in 2002, a direct result of the terrorist acts of 9/11/01. HLS’ mission is to: Prevent terrorist attacks in the U.S. Reduce U.S. vulnerability to terrorism. Minimize the damage and assist in the recovery from terrorist attacks in the U.S.    

How does the U.S. Address Terrorism? The Private sector prepares by: Staging evacuation drills. Securing computer networks. Increasing protection around critical infrastructure assets. Increasing awareness of and security against terrorist attacks and developing response plans in case attacks occur at the workplace.

How Does the U.S. Reduce Vulnerability to Terrorism? Recognize that terrorism takes many forms: Biochemical warfare. Biological weapons. Bio-terrorism. Agro-terrorism. Explosives or other forms, such as on 9/11. Nuclear Weapons.

How Does the U.S. Reduce Vulnerability to Terrorism? Protect critical infrastructure assets: Communications – put plans in place to reassure, instruct, and share information to prevent rumors and panic. Leadership – review emergency planning; know how to respond in a disaster, and how to appropriate the necessary resources. Transportation – plan alternatives for rescuing stranded employees, delivering paychecks, shipping supplies, etc. Geographic location – consider diversifying or relocating. Personnel backup – succession planning in the event of catastrophic loss.

How Does the U.S. Reduce Vulnerability to Terrorism? Protect critical infrastructure assets: Database backup – some redundancy can be helpful if computers and LANs are destroyed. Key dependencies – understand dependence on key vendors in case shipment of supplies is delayed or manufacturing cycles are disrupted. Security – review physical and logical security efforts, including the physical security of buildings and the security of IT systems. Power supply – consider electrical power systems, oil and gas, and water and food supplies.

How Does the U.S. Reduce the Impact of Natural Disasters? Communicate – inform people of approaching storms or fires. Protect critical infrastructure assets.

How Does the U.S. Reduce the Impact of Natural Disasters? Evacuate – evacuations occur hundreds of times each year as a result of fire, flood, the release of harmful substances via industrial accidents, etc. The Federal Emergency Management Agency (FEMA) – reduce the loss of life and property, and protect the nation from all hazards, including natural disasters, acts of terrorism, and other manmade disasters.

What is Private Security’s Job during a Natural Disaster or Act of Terrorism? Collaboration between law enforcement agencies and private security organizations is important, even necessary, but has not reached its potential. Private security is a key element in protecting our homeland from terrorist attacks because the private sector owns 85 percent of the nation’s infrastructure.

What is Private Security’s Job during a Natural Disaster or Act of Terrorism? Private security has three main roles: Information gathering and sharing to provide early warnings of terrorist threats or natural disasters. Acting as first responders – private security professionals are often first responders on the scene. Their first priority is to protect people and property until police or other authorities arrive. Providing assistance and aid after a terrorist attack or natural disaster.

Resources 9780205592401, Introduction to Private Security: Theory Meets Practice, Roberson & Birzer, Prentice Hall, 2010.