Pollution Prevention and Homeland Security Michael J. Ellenbecker Kwangseog Ahn.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Protective Security Advisors Securing the Nations critical infrastructure one community at a time.
Lesson 3 Responding to Emergency Events. For additional information or questions please contact Toledo-Lucas County Health Department APC:
Department of Homeland Security Site Assistance Visit (SAV)
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
Christa-Marie Singleton, MD, MPH Associate Director for Science
National Infrastructure Protection Plan
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
DHS, National Cyber Security Division Overview
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
MODULE “PROJECT MANAGEMENT AND CONTROL” EMERGENCY PLANNING SAFE DECOMMISSIONING OF NUCLEAR POWER PLANTS Project BG/04/B/F/PP , Programme “Leonardo.
Business Crisis and Continuity Management (BCCM) Class Session
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Developing a Chemical Risk Management Program
Environmental Health Unit: Lesson 1 - Introduction Objective: TSWBAT identify issues of how the environment affects our personal health on a daily basis.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
SAFE HOSPITALS & HEALTH RISK REDUCTION. Safe Hospitals Initiative “A health facility whose services remain accessible and functioning at maximum capacity.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Part of a Broader Strategy
Ship Recycling Facility Management System IMO Guideline A.962
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
U.S. Department of Homeland Security Chemicals of Interest Anti-terrorism Standard.
WMD & Emergency Planning Steps Session 12. Emergency Planning Steps Vulnerability Assessment Mitigation Efforts Emergency Response Planning Recovery.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Dam Hazard Consequences Assessment
Occupational Safety and Health 6 th Edition Lecture Notes By: Dr. David Goetsch.
Unit Objectives  Describe the types of hazards to which your community is vulnerable.  Describe the functions of CERTs.  Identify preparedness steps.
Introduction to Workplace Safety
Planning for Resiliency. Primary Reference Emergency Management Principles and Practices for Healthcare Systems, The Institute for Crisis, Disaster and.
Association of Defense Communities June 23, 2015
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
2012 MITA-ATA Annual Conference August 6-8, 2012 Disaster Recovery Planning for Telecommunications Companies.
Dr. Charles W. Beadling Central Asia Regional Health Security Conference April 2012 Garmisch-Partenkirchen, Germany.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
ADM 677 Crisis Management in Educational Settings Karen McCuiston Kentucky Center For School Safety.
Homeland Security Grant Program 2015 Process Michelle Hanneken Illinois Emergency Management Agency.
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
CI/KR Public-Private Partnerships Overview March 2010 Prepared By: Thomas DiNanno International Assessment and Strategy Center.
CARVER+Shock Vulnerability Assessment Tool “As Agile As the Enemy” The Foundation for Institutional Development.
Sandia National Laboratories
The Four Phases of Plant Biosecurity Management Adapting an emergency management model to protect the U.S. agricultural sector from intentional and unintentional.
Introduction to a Safe Workplace
THE COUNTY OF YUBA OFFICE OF EMERGENCY SERVICES The Disaster Mitigation Act of 2000.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
Created by: Ashley Spivey For Department of Homeland Security All information from:
Environment and Disaster Planning Hari Srinivas, GDRC Rajib Shaw, Kyoto University Contents of the presentation: -What is the problem? -Precautionary Principles.
Engineering | Architecture | Design-Build | Surveying | Planning | GeoSpatial Solutions November 16, 2015 THE AWWA J100 - WHAT IT IS, WHY IT IS BEING UPDATED,
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Business Continuity Planning 101
DHS/ODP OVERVIEW The Department of Homeland Security (DHS), Office for Domestic Preparedness (ODP) implements programs designed to enhance the preparedness.
Hazardous materials awareness Chapter 1, intro to hazardous materials.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
Disaster and Emergency Management
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
and Security Management: ISO 28000
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
The U.S. Department of Homeland Security
INTRODUCTION For years there have been attacks around the United States for sometimes now, which is unexpected. However; there have not been good restoration.
Securing Critical Chemical Assets: The Responsible Care® Security Code
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
Training at the Awareness Level Review
Prevention, Intelligence
Presentation transcript:

Pollution Prevention and Homeland Security Michael J. Ellenbecker Kwangseog Ahn

Homeland Security & Preventing Pollution from Attack on Critical Waterside Infrastructure Presented by Ed Badolato, Executive VP, Homeland Security The Shaw Group New Hampshire Pollution Prevention Conference University of New Hampshire September 21, 2004

Vulnerability: How to Audit Your Facility Presented by Ed Badolato Executive Vice President for Homeland Security The Shaw Group University of New Hampshire September 21, 2004

The New Environmental Paradigm Certain parts of the infrastructure are attractive targets for terrorists Certain parts of the infrastructure are attractive targets for terrorists Mass casualties Mass casualties Property damage Property damage Economic losses Economic losses Environmental impact Environmental impact We must reduce risk from indirect releases into the environment We must reduce risk from indirect releases into the environment

Osama bin Laden’s Targeting Philosophy “Inflict maximum damage to human, economic and physical infrastructures” “Attack symbolic, high prestige, economic, and strategic targets”

Pollution as a Terrorist Weapon--Kuwait, 1991

Staten Island Fuel Storage Fire

Four Bad Things That Can Happen from a Terrorist Attack on Your Facility 1. Loss of containment 2. Theft or misuse with intent to cause harm 3. Worker internal or public harm offsite 4. Degradation of assets, business functions, or company value

CRITICAL INFRASTRUCTURES Chemicals and Hazardous Materials Chemicals and Hazardous Materials Energy Energy Transportation Transportation Water Water Telecommunications Telecommunications Agriculture & Food Agriculture & Food Banking and Finance Banking and Finance Public Health Public Health Emergency Services Emergency Services Defense Industrial Base Defense Industrial Base Postal and Express Shipping Postal and Express Shipping

Vulnerability of Petro-Chem Facilities This book was co-authored by Ed Badolato This book was co-authored by Ed Badolato It covers: It covers: Industrial disasters Industrial disasters Process related incidents Process related incidents The terrorist threat to populated areas The terrorist threat to populated areas Sabotage of chem facilities and RR tank cars Sabotage of chem facilities and RR tank cars The cost factor The cost factor

Terrorism and the Chemical Transportation Industry 1. Plug the security gaps noted in industry “Lessons Learned” & “Best Practices” 2. Work across the full spectrum of Homeland Security incidents— preparation, response, recovery 3. Adopt and adapt technology fixes 4. Organize a layered, integrated security system

What We Can Expect in the Future More mass casualty attacks-- More mass casualty attacks-- “few attacks in the US, but they will be closer to the Madrid rail scenario than the WTC 9/11” Terrorist conventional bombings along with WMD attempts-- Terrorist conventional bombings along with WMD attempts-- “bombs will be the most predominant form of attack” More terrorist cells and operatives will be uncovered in the US More terrorist cells and operatives will be uncovered in the US

Laws & Regulations that Impact Facility Preparedness Clean Air Act Clean Air Act Bioterrorism Preparedness and Response Act of 2002 Bioterrorism Preparedness and Response Act of 2002 Maritime Transportation Security Act of 2002 Maritime Transportation Security Act of 2002 Resource Conservation and Recovery Act of 1976 Resource Conservation and Recovery Act of 1976 Occupational Safety and Health Act Occupational Safety and Health Act Emergency Planning and Community Right-to-Know Act Emergency Planning and Community Right-to-Know Act

Chemical/Environmental Security Players Key Agencies & Organizations Key Agencies & Organizations Department of Homeland Security (DHS) Department of Homeland Security (DHS) Environmental Protection Agency (EPA) Environmental Protection Agency (EPA) Department of Justice Department of Justice Department of Defense Department of Defense State & Local Emergency Response State & Local Emergency Response Industry Associations—ACC, SOCMA, and state industry organizations Industry Associations—ACC, SOCMA, and state industry organizations American Institute of Chemical Engineers American Institute of Chemical Engineers Secondary Agencies & Organizations Secondary Agencies & Organizations DOT DOT OSHA OSHA DOE DOE

DHS and the National HS Strategy The three objectives of the national strategy: 1. Prevent terrorist attacks within the US 2. Reduce Americas vulnerability to terrorists 3. Minimize the damage and recover from attacks that do occur

DHS Infrastructure Protective Measures Plan Technical Applications Technical Applications WMD Prevention WMD Prevention Protection Measures Protection Measures Buffer Zone Protection Plan (BZPP) Buffer Zone Protection Plan (BZPP) 1700 sites this year 1700 sites this year Target selection Target selection Surveillance Ops Surveillance Ops Planning Ops Planning Ops Rehearsals Rehearsals Training Training

Industry Safety Management Capabilities Process Safety Management Systems Process Safety Management Systems Hazard Evaluation Procedures Hazard Evaluation Procedures Chemical Process Quantitative Risk Analysis Chemical Process Quantitative Risk Analysis Release Mitigation Release Mitigation Safe Storage & Handling of High Toxic Hazard Materials Safe Storage & Handling of High Toxic Hazard Materials Layer of Protection Analysis Layer of Protection Analysis

We Must Work Across the Full Spectrum of Homeland Security Situations PreparationThreatVulnerabilityRiskCountermeasuresTrainingAlert/WarningResponsePoliceEMSFire Emergency Coordination EvacuationRecovery Emergency Response Incident Mgt Public Safety Clean up Resumption of Operations

Suggestions for Industry Suggestions for Industry The new industry security strategy should: The new industry security strategy should: Identify and prioritize critical infrastructure facilities. Identify and prioritize critical infrastructure facilities. Specify security roles and responsibilities. Specify security roles and responsibilities. Describe appropriate threat/alert information flows. Describe appropriate threat/alert information flows. Set the standards for actionable security plans Set the standards for actionable security plans

Suggestions for Your Facility Assume you are a target Assume you are a target Extend your perimeter—”mutual support” Extend your perimeter—”mutual support” Barriers Barriers Surveillance Surveillance Planning Planning Inform & engage employees Inform & engage employees

The Security Vulnerability Assessment Process 1. Project Planning Meeting--Setting the right course with the company/client 2. Facility Characterization and Critical Asset Identification--A thorough characterization of site asset characteristics and hazards 3. Identify and Prioritize the Threat--Complete evaluation of threats; internal, external, internally-assisted 4. Vulnerability Analysis--Prioritized evaluation of threats against assets 5. Risk Assessment —defining the potential for damage to or loss of an asset 6. Countermeasures Identification and Effectiveness Measurement-- Prioritized validation and justification of costs for improved security, highlighting process/operations benefits 7. Preparing the Report 8. Implementation

Step 3. Identify and Prioritize the Threat-

Threat Methodology Understand how terrorists target facilities Understand how terrorists target facilities Build a detailed, focused assessment Build a detailed, focused assessment Initial screening of sources of threat info Initial screening of sources of threat info Contact with local, state, & federal law enforcement and intelligence agencies Contact with local, state, & federal law enforcement and intelligence agencies Interviews with facility security managers Interviews with facility security managers

Step 4. Vulnerability Assessment

Vulnerability Assessment “Identification of the extent of susceptibility to exploitation, relative to the existence of any countermeasures.”

Two Approaches to Vulnerability Analysis 1. Asset-based analysis: assess potential targets (any attack scenarios) 2. Scenario-based analysis: assess attack scenarios (any asset)

VA Asset-Based Approach Where used: Where used: − “Basic” sites, i.e. no complex security challenges Key Elements Key Elements − Assess and categorize consequences − Assess target attractiveness − Identify and assess key assets Based on consequence and attractiveness Based on consequence and attractiveness Identify areas needing further protection Identify areas needing further protection

VA Scenario-Based Approach Where Used: Where Used: − Complex security challenges − High inherent threat Key Elements Key Elements − Identify key assets/targets − Identify applicable threats − Identify potential scenarios − Drives countermeasures for selected scenarios

Step 5. Risk Assessment

RISK Risk assessment—”a qualitative and/or quantitative determination of the probability of occurrence of an adverse event and the impact of its consequences.” Risk assessment—”a qualitative and/or quantitative determination of the probability of occurrence of an adverse event and the impact of its consequences.”

Step 6. Countermeasures Identification and Effectiveness Measurement-

Physical Security Systems Perimeter Protection Perimeter Protection Fences Fences Lights Lights Gates & Access Controls Gates & Access Controls Entrance/equipment locks Entrance/equipment locks Protection Force Protection Force Electronic security systems--motion detectors Electronic security systems--motion detectors Video surveillance systems, Video surveillance systems, Building alarm systems Building alarm systems

Other Countermeasures Loss prevention & material control Loss prevention & material control Control room security Control room security Distributed Control Systems Distributed Control Systems Crisis management and emergency response Crisis management and emergency response Policies & procedures Policies & procedures IT/Cyber security IT/Cyber security Intelligence Intelligence

SUMMARY SVAs Perform Important Functions SVAs Perform Important Functions Defines roles & relationships Defines roles & relationships Identifies necessary resources Identifies necessary resources Ensures comprehensive security effort Ensures comprehensive security effort Sets plan for implementation Sets plan for implementation

MODULE 2: Introduction to the Toxics Use Reduction Act Toxics Use Reduction Institute

Process Characterization Process Characterization Pre-Plan Identify TUR Options Identify TUR Options Develop or Update Plan Develop or Update Plan Certify Plan Screen & Evaluate TUR Options Screen & Evaluate TUR Options Implement Plan The TUR Planning Cycle Responsibilities of a TUR Planner Measure Success

Similarities in the Security and TUR Assessment Processes The Security Vulnerability Assessment Process 1. Project Planning Meeting 2. Facility Characterization and Critical Asset Identification 3. Identify and Prioritize the Threat 4. Vulnerability Analysis 5. Risk Assessment 6. Countermeasures Identification and Effectiveness Measurement 7. Preparing the Report 8. Implementation Process Characterization Process Characterization Pre-Plan Identify TUR Options Identify TUR Options Develop or Update Plan Develop or Update Plan Certify Plan Screen & Evaluate TUR Options Screen & Evaluate TUR Options Implement Plan The TUR Planning Cycle Measure Success

Importance of TUR in HS CRITICAL INFRASTRUCTURES Chemicals and Hazardous Materials Energy Transportation…

Pollution Prevention and Homeland Security Can use similar assessment methods PP personnel may be qualified to perform HS assessment, particularly in industry using hazardous chemicals PP itself reduces risks in HS – Lower toxicity – Lower volatility/explosion potential – Lower volumes store on site

Opportunities for TURI Appears there is lack of interaction between TUR/PP and HS TURI already has the expertise and resources for TUR/PP that can be applied directly to HS

What TURI Can Do? Advocate TUR to reduce HS risks Extend TURP program to TUR-HSP program Identify and prioritize the HS risks from hazardous chemicals – Use TURA data and TRI data including use amounts, locations of plants, etc. – Use chemical info including explosiveness, flammability, toxicity, etc. – Use other information about presence of symbolic, high prestige, economic, and strategic targets – Combine all the information to prioritize the HS risks Use the planning process to reduce HS risks

Funding Sources? DHS EPA OSHA NSF MA?