Crisis and Emergency Risk Communications: Addressing the challenges Stacey Thompson.

Slides:



Advertisements
Similar presentations
CISSP Seeks CIPP Object: Mutual Compliance Marriage of Privacy and Security Professionals Under HIPAA David B. Nelson, CISSP Yolo County Woodland, California.
Advertisements

GP-DRR Parallel Meeting Disaster Preparedness M C. Oxley 4 th June 2007 Purpose: To stimulate substantive discussion on disaster preparedness in support.
Proposal for an Emergency Communications Framework In Lebanon - IEEE Workshop - - Lebanese American University - 12 November 2011 Patrick EID Commissioner,
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Planning for the Future Disaster Recovery Plan / Business Continuity Plan Jim Zukowski, Ed.D. Texas State Board of Dental Examiners 2006 Annual ConferenceAlexandria,
A Brief Overview of Emergency Management Office of Emergency Management April 2006 Prepared By: The Spartanburg County Office of Emergency Management.
Disaster Recovery Planning Because It’s Time! Copyright Columbia University and Bentley College, This work is the intellectual property of the author.
Public Librarians’ Response to Hurricanes: Lessons, Issues and Strategies Rebecca Hamilton State Librarian State Library of Louisiana.
Types of Computers & Computer Hardware Computer Technology.
1MRO.PPT LAST REVISED: 9 JULY 2008 Citizens Serving Communities Mission Radio Operator Skills and Requirements Developed as part of the National Emergency.
Achieving Greater Success in Emergency Management by Preparing & Planning with Public Works.
Disaster Communications System (DCS) Overview for State and Local Governments National Conference on Emergency Communications (NCEC) Panel 5: State and.
Chapter 10 Managing the Delivery of Information Services.
PPA 573 – Emergency Management and Homeland Security Lecture 4c – Planning, Training, and Exercising.
Network security policy: best practices
A mateur R adio E mergency S ervices & D isaster S ervices T echnology.
M. Guymon Pleasant Grove High Spring 2003 Types of Computers & Computer Hardware Computer Technology Day 1.
Phuket, Thailand, 20 May 2013 Roles of NBTC in Disaster Relief Atiwat Aimdilokwong Division Director, NBTC ITU Workshop on “Disaster.
1MRO.PPT Last Revised: 10 June 2003 Mission Radio Operator Skills and Requirements Developed as part of the National Emergency Services Curriculum Project.
Lecture Week 2 Networks, The Internet and the World Wide Web.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
IMPLEMENTATION ALERT EMERGENCY SYSTEM IN CHILE SUBTEL Montreal, ITU Symposium on ICTs, the Environment and Climate Change.
Legal Administration and Technology ©2007 Thomson Delmar Learning. ALL RIGHTS RESERVED. Chapter 2 Practical Law Office Management, 3 rd Edition, Thomson.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Survivability Considerations for Design of Government Private Wireless Networks Clay Whitehead Motorola Networks and Enterprise.
Course Overview Course Requirements Knowledge and Skills Student Expectations.
Protecting ICT Systems
Extending Traditional Desktop Office Communication Systems Chuck Harden, System Analyst Nick Kwiatkowski, System Analyst.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Concepts of Database Management Sixth Edition
PAR CONFERENCE Homeland Defense A Provider’s Perspective Lessons from TMI Dennis Felty November 15, 2001.
National Rural Transit Assistance Program. Learning Objectives Safety Safety Security Security Emergency Preparedness Emergency Preparedness.
Programming of International Development Assistance Donor Sectoral Meeting Ministry of Interior September 17, 2007.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
1 Crisis Management / Emergency Management Overview.
SETON HALL UNIVERSITY STAFF ORIENTATION: EMERGENCY PROCEDURES SETON HALL UNIVERSITY STAFF ORIENTATION: EMERGENCY PROCEDURES.
Networks.
Learning Objective 1 Explain the procedures for receiving emergency and nonemergency external communications.
Flash Flood Forecasting as an Element of Multi-Hazard Warning Systems Wolfgang E. Grabs Chief, Water Resources Division WMO.
Database Administration
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Emergency Communications Management Annual Meeting February 11, 2008 Richard Hach, Associate Director Network Administration.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Types of Computers & Computer Hardware Computer Technology Day 1.
What Is an Incident? An incident is an occurrence, caused by either human or natural phenomena, that requires response actions to prevent or minimize.
Emergency Communication Plan and Equipment Requirements for Your Organization DRAFT 22 October 2007 Clip art images are a place holder for a photo of your.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
ISM Code 2010: Part A - Implementation Malcolm Maclachlan.
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
R. Stewart Fayetteville High School Types of Computers & Computer Hardware Computer Technology.
Business Continuity Disaster Planning
IPAWS (Integrated Public Alert & Warning System) Quick Brief.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Organizing and leading the IT function Two set of tensions guide policies for developing, deploying and managing IT systems. 1.Innovation and control a.How.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
Regulatory Measures and Crises Management Dr. M. Yaseen Pakistan Telecom Authority.
Photos: WFP/ Mariko Hall; Telecoms Sans Frontieres REGIONAL ETC WORKSHOP, SAMOA, JULY 2016 NDMO PRESENTATION EMERGENCY TELECOMMUNICATIONS FIJI ISLANDS.
Computers in the Ambulatory Care Setting
Fire Safety & Disaster Planning
CT1503 Network Operating System
Black Swan Ohio SET Black Swan Ohio SET 2017.
Disaster and Emergency Planning
CCNA Discovery Curriculum Review
Using Technology to Manage Information
Oman Experience on Telecommunications Emergency Plan
بسم الله الرحمن الرحيم Palestine Initiative on The Use of Telecommunications  in Disaster and Emergency Situations Regional Conference on “Disaster:
Presentation transcript:

Crisis and Emergency Risk Communications: Addressing the challenges Stacey Thompson

CONTEXT –Emergency Communications vs Emergency Information Management (beware of much communications and little information) –Redundancy is the essence of EC, but along with that comes the need for a wide variety of protocols and skills for different Communications methods. –“Hi-tech” communications equipment is of little use during crises without adequate preparatory legislation, management, protocols, training and qualified operators. –Traditional communications methods are often ignored in favour of hi-technology, but they should not be considered mutually exclusive during emergencies.

AIM To outline some EC challenges experienced during crises and to underscore lessons learned

Challenge # 1 Plug in Turn on

Operations Routine Operations Crisis Operations –Deployment of equipment Pre-positioning Post-Impact deployment –Information Handling Protocols Message Formats/Forms Message Reporting Structure Routing Priorities

Operations Diagram, Frequency, Codes, Radios, ANTennaS Multi language warnings as most vulnerable (immigrants) often do not speak national broadcast language Warning systems for special needs groups Interoperability of equipment

EC Legislation Commandeer private facilities if needed Public warning responsibilities for private Telecoms licensing requirements Customs arrangements for Intl Assistance (Tampere Convention) Authority

EC Legislation Enforcement of Responsibilities Lack of legislation prevents adequate staffing Regulations and Procedures needed to operationalize legislation Telecommunications monopolies MOUs for use of private / NGO human and material resources during crises Needed to remove hurricane centered mindset

Organization, Leadership and Management Lead agency not accepting responsibility for EC –No ownership of EC –Lack of leadership –Lack of training of lead agency in DRM causes confidence gaps hence low priority given to EC

Organization, Leadership and Management Existence of EOC/ECC –Radio Room –Communications Area –Computer Room –Needed to confirm, coordinate, monitor and manage Information from many different sources

Organization, Leadership and Management Communications with and between –NEOC –Disaster Site –CEOC –Shelter –International donor –Victim –Agencies HQs

Staff Full Time Person(s) needed for EC Management Career path needed for motivation Qualified Experienced

Staffing Crisis Operators –Identified beforehand instead of random details –Very familiar with equipment –Very familiar with computer software –Properly briefed on equipment –Operators understand battery technology –Operator knowledge of voice/radio procedures

Plans and Planning –Communications SOPs –Easily Understandable Communications Diagrams

Training EC Theory Practical “Hands on” with equipment Drills Exercises

Choice of Technologies Blackberry and other technologies have merged and personalized communications and Information Management Sometimes causes misguided belief that one person can run EC from a PDA Appropriateness for situation Use of digital (data) communications instead of analogue (voice) communications

Equipment Land Line –Downed lines make unreliable comms during storm emergencies Radios –Adequate number of Radios ? –Adequacy for Task/Fitness for Role ? –Radios Working when Deployed? –Radios Tested Before Deployment? –Frequency/channel assignments correct? –Redundancy issues

Redundancy issues –Trunking Vulnerable to maintenance and upgrading problems and “control” issues –Use of HF Abandoned by some countries for sat phones Needs much training and expertise to operate and maintain Strategic alliances for trained operators at strategic locations Strategic alliances for maintenance pers at strategic locations Dysfunctional HAM clubs - skills being lost

Cell Phones –Over-reliance on this comms –Often unreliable –Commerce driven –Vulnerable to wind damage –Voice and SMS Jamming –Pre-Arranged Priority Calls –Cell Alert Technology for Call Out –Expensive to operate

Satphones –Activated before deployment? –Choice of Hand Held or Outside Antenna? –Useable inside building (EOC/Shelters) with outside antenna –Tendency to use like cell phones –Attempts to call incorrect satphone numbers –Incorrect dialing procedures/codes/prefixes –Operators only see this equipment during emergency response and do not know how to use them –Expensive to operate hence limited application

911 –Police operators tend to focus response on crime calls –Best practice - Better operated by civilians –Can automate with reverse 911

Cell Alert –Who pays for this? – Cell providers ? –Great for Geographic based warning system

SMS –Jams network when many numbers used simultaneously –Providers can prioritize for EC only

Cable TV –Antennae and cable affected by hurricanes –Good for other emergencies

–Blackberry a good addition to EC arsenal –Great for data comms, documentation, transmitting large amounts of information, tables, lists, etc –Power sources

EM software for EM system –Location and administration of server contentious –Security concerns by some countries

Megaphones Sirens Runner Flags Whistles Drums Light signals Morse code

Computers –Power sources –Operator skills –Portability –Loss of data Backup –Use of wireless networks Operator knowledge –Adequacy for task Networked? Appropriate Software Memory Hard disk Speed Portable (Laptop) or Fixed (Desktop)

Batteries –Sufficient batteries per radio for extended operations ? –Batteries charged before deployment ? –Will batteries maintain charge for reasonable period of time ? (one day)

Maintenance Programme –Serviceability Rate –Plan for Base Maintenance ? –Plan for Field/First Line Maintenance ? –Plan for Routine Maintenance ? –Care and maintenance of Equipment Radios Well Maintained ? Daily Risk Reduction Measures –Location of ECC –Disassembly of vulnerable outside equipment before hurricane blow –Protection from power surges/Lightening/Etc

Back Up Power –Generators Adequate number of generators for EOCs, shelters etc Size of generators Fuel for Generators Adequate and safe fuel storage for generators Procedures for refilling generators –UPS –Inverters –Solar Chargers

Public Information and Education –Public not aware of protocols

THANK YOU Questions ???