Presentation on theme: "Homeland Security and You University of Virginia Police Brian Del Vecchio Brian Del Vecchio Emergency Planning Coordinator."— Presentation transcript:
Homeland Security and You University of Virginia Police Brian Del Vecchio Brian Del Vecchio Emergency Planning Coordinator
Answers to these questions: What is terrorism and who are its targets? What is terrorism and who are its targets? What weapons do terrorists use? What weapons do terrorists use?
Answers to these questions: What is Homeland Security? What is Homeland Security? What do the Homeland Security Alert System symbols mean? What do the Homeland Security Alert System symbols mean?
Answers to these questions: What can I do to protect myself and others? What can I do to protect myself and others? What are the University Police doing to safeguard the Grounds? What are the University Police doing to safeguard the Grounds?
What is terrorism? The unlawful use or threatened use of force or violence by a person or organized group against people or property with the intention of intimidating or coercing societies or governments, often for ideological or political reasons. The unlawful use or threatened use of force or violence by a person or organized group against people or property with the intention of intimidating or coercing societies or governments, often for ideological or political reasons.
What is terrorism? Terrorists often use threats to: Terrorists often use threats to: Create fear among the public. Create fear among the public. Try to convince citizens that their government is powerless to prevent terrorism. Try to convince citizens that their government is powerless to prevent terrorism. Get immediate publicity for their cause. Get immediate publicity for their cause.
Current trends in terrorism Increasing lethality and focus on weapons of mass destruction. Increasing lethality and focus on weapons of mass destruction. Targeting general population, not specific objectives. Targeting general population, not specific objectives. Use of secondary devices to attack emergency personnel. Use of secondary devices to attack emergency personnel.
Potential targets of terrorism Business and industrial facilities and personnel Business and industrial facilities and personnel Special events and public gatherings Special events and public gatherings Educational institutions Educational institutions Houses of worship Houses of worship Critical infrastructure Critical infrastructure
Potential forms of terrorism Weapons of Mass Destruction (B-NICE) Weapons of Mass Destruction (B-NICE) Biological Biological Nuclear Nuclear Incendiary Incendiary Chemical Chemical Explosive Explosive Other forms of terrorism Other forms of terrorism Arson Hijacking Homicide Cyber-terrorism Hate-motivated attacks
Nuclear agents Types: Types: Nuclear weapons Nuclear weapons Radiological waste Radiological waste Dirty bombs Dirty bombs Least likely of all forms of attack Least likely of all forms of attack Only instruments can detect radiation Only instruments can detect radiation
Biological agents Classes of potential biological agents: Bacteria Bacteria Anthrax and the plague Anthrax and the plague Viruses Viruses Smallpox and Ebola Smallpox and Ebola Toxins Toxins Botulism and Ricin Botulism and Ricin
Biological agents Dispersal of biological agents (bacteria, viruses, toxins): Mail delivery Aerial spraying Explosive devices Injection Food source contamination
Biological agents Delayed effects make identifying the attack more difficult. Signs and symptoms of many biological attacks first manifest as flu-like. Only a few biological agents are contagious: - Smallpox - Plague - Viral hemorrhagic fever (Ebola)
Chemical agents Extremely toxic Quick acting Many are readily available or easy to make
Nuclear-Biological-Chemical agents Limitations of NBC agents: Effective dissemination difficult. Effective dissemination difficult. Delayed effects can detract from impact. Delayed effects can detract from impact. Counterproductive to terrorists support. Counterproductive to terrorists support. Potentially hazardous to the terrorist. Potentially hazardous to the terrorist. Development and use require skill. Development and use require skill.
Incendiary agents Fire bombs Arson Time-delayed devices
Explosive agents Pipe bombs Letter bombs AMFO (ammonium nitrate and fuel oil) TNT, dynamite Military ordinance
Homeland Security In the aftermath of the terrorist attacks of Sept. 11, 2001, 22 previously disparate domestic agencies were coordinated into the U.S. Department of Homeland Security.
Homeland Security The new department's first priority is to protect the U.S. against further terrorist attacks. Component agencies: Analyze threats and intelligence Guard borders and airports Protect critical infrastructure Coordinate the response for future emergencies
Homeland Security Advisory System The world has changed since Sept. 11, We remain a nation at risk to terrorist attacks and will remain so for the foreseeable future. Five Threat Conditions represent levels of risk of terrorist attack.
Homeland Security Advisory System 1.Exercise preplanned protective measures. 2.Provide training on this Advisory System and on specific preplanned department or agency protective measures. 3.Regularly assess facilities for vulnerabilities and mitigate these as possible. Low Risk (Green)
Homeland Security Advisory System 1.Check communications with designated emergency response or command locations. 2.Review and update emergency response procedures. 3.Provide the public with any information that would strengthen peoples ability to act appropriately. Guarded Risk (Blue)
Homeland Security Advisory System 1.Increase surveillance of critical locations. 2.Coordinate emergency plans as appropriate with local jurisdictions. 3.Assess whether the threat requires further refinement of preplanned protective measures. 4.Implement, as needed, contingency and emergency response plans. (Yellow) Elevated Risk (Yellow)
Homeland Security Advisory System 1.Coordinate with federal, state and local law enforcement agencies or national guard, other armed forces organizations. 2.Take additional precautions at public events; consider alternate venues or even cancellations. 3.Prepare to execute contingency pro- cedures such as moving to an alternate site or dispersing the workforce. 4.Restrict threatened facility access to essential personnel only. (Orange) High Risk (Orange)
Homeland Security Advisory System Severe Risk (Red) Under most circumstances, the protective measures for a Severe Condition are not intended to be sustained for substantial periods of time.
Homeland Security Advisory System 1.Increase or redirect personnel to address critical emergency needs. 2.Assign emergency response personnel and pre-position and mobilize specially trained teams or resources. 3.Monitor, redirect, or constrain transportation systems. 4.Close public and government facilities. Severe Risk (Red)
Protect yourself and others In general: Be alert and aware of your surroundings: Conspicuous or unusual behavior Threatening or suspicious remarks Unattended objects: backpack, briefcase, luggage If you suspect it, report it!
Protect yourself and others What is wrong with this picture? Unclaimed luggage
Protect yourself and others When calling 9-1-1, provide the following details: What happened What happened Where it happened Where it happened Is anyone injured? How many? Nature of injuries? Is anyone injured? How many? Nature of injuries? Suspect / vehicle description Suspect / vehicle description Where you will meet the responder(s) Where you will meet the responder(s)
Protect yourself and others Prepare in advance. The very nature of terrorism suggests there may be little or no warning. Rehearse emergency plans with family. Keep an emergency kit at home, at work, and in your car. Know how to turn off your utilities.
Protect yourself and others Mail delivery: Each day, the U.S. Postal Service delivers nearly 680 million pieces of mail to 136 million business and residential addresses. 208 billion pieces annually – almost half the worlds mail. UVA handles millions of pieces annually.
Protect yourself and others Characteristics of suspicious mail: Letters with oily stains. Envelopes that are lopsided, rigid, bulky, discolored or have a strange odor. Unexpected envelopes from foreign countries. No postage, excessive postage, and non- cancelled postage.
Protect yourself and others What to do with suspicious mail: Do not touch. Do not open the envelope or package. If already open, reseal to limit additional exposure. If powder is present, do not attempt clean-up. Keep others away. Immediately close doors to contain the area; evacuate. Call
Protect yourself and others What to do with suspicious mail: If you have made contact with suspicious material, If you have made contact with suspicious material, - Do not touch your eyes, nose or any other part of your body. - Wash hands and body thoroughly with soap and water. - Change clothing immediately. - Do not contaminate others or adjacent areas. - Call
Protect yourself and others At work: Report suspicious people or activities, packages or vehicles. Report abandoned or unattended vehicles. Check physical security arrangements. Check security cameras to ensure they are working properly.
Protect yourself and others At work: Have you been requested to provide an unusual service or task? Have you had a request for information that is proprietary in nature? Maintain secure areas, restrict access. Allow only authorized cleaning personnel into the facility.
Protect yourself and others At work: Know your emergency evacuation assembly point vs. shelter in place. Keep an emergency kit in your office along with a change of clothing & comfortable shoes. Have an emergency communication plan so you can contact family.
Protect yourself and others When traveling: Do not leave bags unattended, even for a minute. Do not accept packages from strangers. Minimize the time spent in public areas at airports. Move quickly from check-in to secured areas. Remain aware of your surroundings.
Protect yourself and others When traveling abroad: Consult the U.S. State Departments Bureau of Consular Affairs site at forttp://www.travel.state.gov Travel warnings Information sheets Regional travel brochures
What is UVA doing? Crisis Incident Management Team City/County/University Emergency Operations Plan Evacuation drills / tabletop and field exercises UVA Emergency Critical Incident web site at Training such as CERT/Medical Reserve Corp Liaison with local, state, federal agencies is ongoing
Fallacies and myths It cant happen here. It cant happen here. B-NICE agents are so deadly, the victims will all die anyway. B-NICE agents are so deadly, the victims will all die anyway. There is nothing we can do. There is nothing we can do.
Summary of tips for your safety Know your neighbors and your environment. Know your neighbors and your environment. Have personal emergency kits and plans in place. Have personal emergency kits and plans in place. Immediately report anything suspicious. Call Immediately report anything suspicious. Call Review UVA emergency preparedness materials at http//www.virginia.edu/emergency/plan.html Review UVA emergency preparedness materials at http//www.virginia.edu/emergency/plan.html
University of Virginia Police Brian E. Del Vecchio Brian E. Del Vecchio Emergency Planning Coordinator Becky Campbell Community Relations Becky Campbell Community Relations