Homeland Security CJ 355 Unit 6 Professor David R. Thompson.

Slides:



Advertisements
Similar presentations
Protective Security Advisors Securing the Nations critical infrastructure one community at a time.
Advertisements

Writing an Environmental Health Emergency Response Plan Advanced Practice Center Roadshow August 11-12, 2009 Albuquerque, New Mexico Brian R. Golob, CHMM,REHS.
Hazard, Threats, Risk, Etc. An examination of some key terms … Walter G. Green III, Ph.D., CEM Disaster Theory Series No. 3 Copyright 2008 by Walter G.
What Threat, What Capability, What Resources? –And Why is Community so Important? 2012 Whole Community Pandemic and All-Hazards Readiness Summit David.
The Science of Agroterrorism Bob L. Larson, DVM, PhD, ACPVM University Extension, Commercial Agriculture Program, Beef Focus Team University of Missouri,
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Component 1: Introduction to Health Care and Public Health in the U.S. 1.8: Public Health Part II 1.8b: Public Health and Terrorism.
Charles Feer WMD Instructor Center for Domestic Preparedness Instructor of Criminal Justice Bakersfield College.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Overview of Terrorism Research at the CDC Dixie E. Snider, M.D., MPH. Associate Director for Science Presented at 2003 Medical Research Summit March 6,
Randy Marchany VA Tech Computing Center
Information on Agro/Bio terrorism Potential Occurrences and Emergency Management of Animal Diseases.
Department Operations Center Quarterly Meeting January 18 th, 2011.
Emergency Preparedness Laura Long Health Services Agency Public Health Dept.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
MAN MADE DISASTERS. DEFINITION Disasters can be man made where the cause is intentional or unintentional. All kinds of man made disasters lead to human.
Submitted by: Abhashree Pradhan CA (1)
FOOD SAFETY AND SECURITY Operational Risk Management DHHS, US Food and Drug Administration, Center for Food Safety and Nutrition November 2001.
Homeland Security Planning Scenarios The White House Homeland Security Council (HSC) - in partnership with the Department of Homeland Security (DHS), the.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Introduction to Health Care and Public Health in the US
CRITICAL INFRASTRUCTURE & CONTINUITY OF OPERATIONS IN A POST 9/11 WORLD Presented by: Dr. Pamela Collins, EKU/JSC.
Hospital Incident Command System Module 11 Incident Planning and Incident Response Scenarios.
1 Emergency Management and Risk Analysis for Hazardous Materials Transport Shashi Nambisan Professor of Civil Engineering Dept of Civil & Environmental.
State Homeland Security Assessment and Strategy Program Develop Planning Factors for CBRNE Scenarios.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Chapter 19: Terrorism Awareness. Knowledge and Attitude Objectives 1.Define terrorism. 2.Describe potential terrorist targets and risks. 3.Explain the.
Terrorism Introduction Meg Scott Phipps, Commissioner John T. Hoffman Director, Threat & Mitigation
Catastrophe Readiness and Response Session 7b 1 Session 7b Critical Infrastructure Drew Bumbak.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Standardized Awareness Authorized Training, Train-the-Trainer Prevention and Deterrence.
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
Copyright © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 19: Community Preparedness: Disaster and Terrorism.
1 Session 7, Section 2 Critical Infrastructure Drew Bumbak.
© 2012 Delmar, Cengage Learning Chapter 16 Weapons of Mass Destruction, Hurricanes and Natural Disasters.
Homeland Security Planning Scenarios The White House Homeland Security Council (HSC) - in partnership with the Department of Homeland Security (DHS), the.
Chapter Six: Types of Modern Terrorism. Cyberterrorism.
Terrorism Risk Insurance Act Presentation by Dennis Fasking, FCAS, MAAA Midwestern Actuarial Forum September 23, 2004.
Copyright © 2008 Delmar. All rights reserved. Part V Public Health Nursing in the 21 st Century.
CI/KR Public-Private Partnerships Overview March 2010 Prepared By: Thomas DiNanno International Assessment and Strategy Center.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Risk management and disaster preparedness
Sandia National Laboratories
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Response to Terrorism and Weapons of Mass Destruction Chapter 38.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Created by: Ashley Spivey For Department of Homeland Security All information from:
Disaster Types Technological Disasters Natural Disasters “Complex” Disasters or Terrorism acts.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Disaster and Emergency Management Security Services.
66 th SESPTC – West Virginia.  Threat Assessment Overview  Understanding THIRA  The Threat Assessment Process  Assessing Your Hazards  Vulnerability.
Module 18 National Preparedness. Postmaster, Levels Module 18Slide - 2 Facility, Personal & Vehicle Security Workroom Floor Access Keys Arrow Keys.
Module 8 Risk Management. Manager, Customer Services Module 8Slide - 2 Objective The learner will be able to: –Develop an understanding of Security Responsibility.
EPA and Homeland Security
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
Disaster and Emergency Management
Joint Force Headquarters-Michigan CCIRs and PIRs
Joint Force Headquarters-Michigan CCIRs and PIRs
Health Action in Emergencies اقدامات بهداشتی در شرایط اضطراری
TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH
The U.S. Department of Homeland Security
Chapter 4 Hazards.
Weapons of Mass Destruction
Community College track: Emergency Operations
TERRORISM Terrorism—the planned threat or use of violence, often against the civilian population, to achieve political or social ends, to intimidate opponents,
WHAT DO FIRST RESPONDERS EXPECT DURING A SCHOOL INCIDENT?
Presentation transcript:

Homeland Security CJ 355 Unit 6 Professor David R. Thompson

What Is Risk Assessment?

A Report That Shows An Organization’s Vulnerabilities And The Estimated Cost Of Recovery In The Event Of Damage. It Also Summarizes Defensive Measures And Associated Costs Based On The Amount Of The Risk The Organization Is Willing To Accept (The Risk Tolerance)

DHS Defines Threat Assessment As A Systematic Effort To Identify And Evaluate Existing Or Potential Terrorist Threats To A Jurisdiction And Its Target Assets. Due To The Difficulty In Accurately Assessing Terrorist Capabilities, Intentions, And Tactics, Threat Assessments May Yield Only General Information About Potential Risks

Identifying The Threats Natural Hazard Or Disasters  Flood  Wind  Earthquakes (seismic)  Hurricanes  Tornados Human Caused Hazards  Hazmat Leak  Nuclear Accident  Transportation Accident  Criminal Activity

Terrorism Or Terrorist Activity  Vehicle Bombs  Suicide Bombs  Hand Placed Or Thrown Bombs  Covert Entries  Mail Bombs  Airborne Contamination  C.B.R. Agents

The Most Common Weapon Of Terrorism Is The Bomb

Technology  Cyberterrosim  Biological Agents  Chemical/Radiological

Cyber terrorism  Use Of Computers To Attack Technological Targets  Physical Attacks On Computer Networks  Computer Hacking With A Body Count (Grossman, 1999)  The Ways Terrorists Might Use Computers And Information Networks (Council On Foreign Relations, 2004)

Examples Of Cyber terrorism  Defacement Of Websites  Computer Virus  Bogus Computer Chips  Trojan Horses  Back Doors  Overloading An Electrical System  The Internet Is A Command And Control System

Biological Agents  Bacterial Or Viral  Natural Poisons  Viruses  Bacteria  Plagues

Most Threatening Biological Agents  Small Pox  Anthrax  Plague  Botulism  Tularemia And Hemorrhagic Fever

Examples Of Biological Attacks  1984 Oregon Religious Group Spreads Bacteria In Local Salad Bars To Influence An Election  2001 Anthrax Sent Via U.S. Mail

Chemical And Radiological  Radiation  Nerve Agents  Blood Agents  Chocking Agents  Blistering Agents

Chemical / Radiological Effects  Loss Of Bodily Fluids / Functions  Burns  Respiratory Failure  Death

Most Threatening  Dirty Bomb (Conventional Explosive Used To Spread Chemical Or Radioactive)  Nuclear Bomb

Critical Infrastructure  Agriculture And Food  Public Health And Health Care  Drinking Water  Wastewater Treatment System  Energy  Banking And Finance  National Monuments And Icons  Defense Industrial Base

Critical Infrastructure Continued  Information Technology  Chemical  Transportation Systems  Emergency Services  Postal And Shipping  Dams  Government Facilities  Commercial Facilities  Nuclear

What Is The Possibility Or Likelihood Of An Attack? 1. Is It A Tempting Target Based On The Goals And Motivations Of The Group? 2. Does The Group Have The Capability To Carry Out The Attack?

Risk = Threat x Vulnerability x Criticality

Risk Is Defined As The Extent To Which An Asset Is Exposed To A Hazard Or Danger

Threat Times Vulnerability Represents The Probability Of An Unwanted Event Occurring, And Criticality Equals The Consequence Of Loss Or Damage To The Critical Infrastructure Or Key Asset

Discussion Of The 911 Attacks

Questions