Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.

Slides:



Advertisements
Similar presentations
Public Health and Healthcare Issues. Public Health and Healthcare.
Advertisements

Museum Presentation Intermuseum Conservation Association.
Consequence Management Planning Meg Scott Phipps, Commissioner John T. Hoffman Director, Threat & Mitigation
First National Course on Public Health Emergency Management 12 – 23 March Muscat, Oman BCRN Management Perspectives Nasser H. Al-Azri BSc, MD, MRCS(A&E),
WMD Crime Scene Management
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
Copyright © Allyn & Bacon 2010 Global Social Problems: War and Terrorism This multimedia product and its contents are protected under copyright law. The.
© SEESAC, SALW Control Name? Organisation? Event? Date?
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
F. STEINHAUSLER AND A. SOBEL CBRN Terrorism Mitigation: New Aspects.
Threat/Vulnerability Assessments for Foods FDA Science Board Advisory Committee Meeting November 6, 2003 Robert E. Brackett, Ph.D. Director, Food Safety.
Alexander Brandl ERHS 561 Emergency Response Environmental and Radiological Health Sciences.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Visual 1.1. Visual 1.2 What is CERT? The Community Emergency Response Team (CERT) program helps train people to be better prepared to respond to emergency.
Progressiveness A Vital Principle in Emergency Management.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
State Homeland Security Assessment and Strategy Program Risk Assessment Process.
Hazard Analysis: Elements, Process, and Variation Robert M. Schwartz, Ph.D. Stacy L. Willett, M.A. Associate Professors- Emergency Management Department.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Engineering Risk Assessments and Risk Communication Sarah Arulanandam, Hazard and Risk Group RWDI West Inc. DISCLOSURE OF MATERIAL ENVIRONMENTAL EXPOSURES:
BSAF-BIONET Meeting Robert J. Hashimoto, CBSP University of California, Berkeley October 2, 2009.
Occupational Safety and Health 6 th Edition Lecture Notes By: Dr. David Goetsch.
Hazards and Disaster Management
Hospital Preparedness & Epi’s as partners in support of Public Health Preparedness Richard Bartlett, B.S., M.Ed. Emergency Preparedness & Trauma Coordinator.
State Homeland Security Assessment and Strategy Program Develop Planning Factors for CBRNE Scenarios.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Institute for Security Studies Institute for Security Studies Submission on the Anti-Terrorism Bill Some Comments and Suggested Approaches.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Chapter 17 - Defining Terrorism. Terrorism in the US prior to 9/11 Bombings with the Union movement - Haymarket Square Have any presidential assassinations.
Terrorism. What is Terrorism? Terrorism is a criminal act that influences an audience beyond the immediate victim. The strategy of terrorists is to commit.
0 Peter F. Verga U.S. Department of Defense 2 Definitions Homeland Security – A concerted national effort to prevent terrorist attacks within the United.
Copyright © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 19: Community Preparedness: Disaster and Terrorism.
Bernards Township Office of Emergency Management February 28, 2012.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
Terrorism & Bioterrorism Communication Challenges Module 9.
Bronx Engineering & Technology Academy AIM: What is Terrorism? Do Now: Define Terrorism Terrorism.
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
CBRN Terrorism Mitigation: One Science for Global Cooperation Scenario CBRN Post-Attack 100 Days: Recovery, Risk and Communication Prof. F. STEINHÄUSLER,
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
LECTURE #7 Global Trends in Violent Conflict, Data are for 158 countries with populations of at least 500,000 with 500 or more deaths directly.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Maximizing the Facility Hazard Vulnerability Assessment
Recreation & Security HPR 413. General Security Must encompass all operations of the organization Should be written into management plans – Plans include.
 War  Guerrilla war  Terrorism  Coups d’état  Assassination  Economic/property damage  Sabotage  Riot Continuum 1.
Establishing an Aviation Risk Context APEC TPTWG-27 Aviation Security Experts Sub-Group Meeting Denise Morgan Office of Transport Security May 2006.
Federal Political Contributors, by Income and Region, Canada, 1988 Contributors/10,000 tax filers Income group Region.
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Risk Assessment Process
Disaster and Emergency Management
Risk Assessment OSHA 21/09/ WHAT IS RISK ASSESMENT? Risk Assessment is the process of determining the possibility of short and long term unfavorable.
Disaster and Emergency Planning
Žilinská univerzita v Žiline Fakulta špeciálneho inžinierstva
Joint Force Headquarters-Michigan CCIRs and PIRs
Disaster Preparedness
Research Project Overview
Joint Force Headquarters-Michigan CCIRs and PIRs
Liberal Arts Research Professor of Political Science
The U.S. Department of Homeland Security
FY 2014 SHSP and UASI Risk Formula
Unit 1 Emergency Procedures.
Training at the Awareness Level Review
TERRORISM Terrorism—the planned threat or use of violence, often against the civilian population, to achieve political or social ends, to intimidate opponents,
Region 13 and the Healthcare Coalition of Southwestern PA
Deborah Housen-Couriel, ADV.
Presentation transcript:

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John C. Pine, Louisiana State University William Waugh, Georgia State University

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 2 Terrorism Terrorism or the threat of terror involves acts of violence used in peace, conflict or war and are acts that shock the senses of reasonable people (Simonsen). Terrorism is violence or the threat of violence used and directed in pursuit of or in service of a political aim.

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 3 Definitions of Terrorism (Rosie 1987) Violence or threatened violence intended to produce fear or change (simple definition) Criminal violence violating legal codes and punishable by the state (legal) National or other groups used to attack other interests (state-sponsored) Power of the government used to repress its people to the point of submission (state)

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 4 Hoffman (1998) distinguishes terrorist acts from other types of criminal acts Terrorism has political aims and motives Terrorism is violent or acts that threaten violence Terrorism acts have far-reaching psychological repercussions beyond the immediate victim or target; The terrorist act is conducted by an organization with an identifiable chain of command or structure; Perpetrated by a sub-national group or non-state entity.

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 5 Terrorist incidents may include: Verbal or written threats of violence, Physical attacks with or without weapons, Attacks using chemical, biological agents, nuclear or radiological materials; Destruction of power stations, water systems, and other critical infrastructure systems.

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 6 Potential Domestic Targets to Terrorism Continuity of government services Transportation Utilities Banking & Finance Information & Communication Public Health Emergency Services Recreation Religious, academic or cultural institutions Commercial or industrial sites Special events such as celebrations

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 7 Risk Assessment Risk assessment involves the clarification of the nature of a risk, including its probability of occurrence and likely intensity, and measuring its potential impact on people, property and the environment.

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 8 Risk Risk is reflected in the equation stating that risk is the likelihood of an event occurring multiplied by the consequence of that event. Risk = Likelihood of Occurrence x Consequence

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 9 Terrorism Risk Assessment Terrorism is chronic and an ongoing threat; The goal of terrorism risk assessment initiatives is to improve preparedness against potential terrorist attacks; It may be used to establish local, regional and state priorities for terrorism planning; It helps to clarify vulnerability of local, regional or state targets; The impacts of a hazardous condition can come in the form of vulnerability or consequence assessment.

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 10 Vulnerability A description or measure of what is exposed and susceptible to hazard impacts rather than a prediction of what will happen. Vulnerability focuses on measurable physical, political, economic or social variables.

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 11 Terrorism Vulnerability Profile The approach uses the concept of the “most likely scenario” as a basis of analysis. The approach assumes that an attack would produce death, injuries, or infrastructure damage that would overwhelm the jurisdiction’s emergency response capabilities including any mutual aid agreements/assistance pacts.

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 12 Terrorism Events (Hoffman 1998) Rarely uncontrolled Premeditated and carefully planned Targets and methods based on the sponsoring group’s: –Aims –Resources –Personalities of key members –Internal dynamics of the group

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 13 Level of Visibility Invisible – Classified Location 0 Very Low Visibility – Not aware of its existence 1 Low Visibility – Probably not well known existence 2 Medium Visibility – Existence is probably known 3 High Visibility – Existence well known 4 Very High Visibility – Existence is obvious 5

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 14 Criticality of Target Site to Jurisdiction No Usefulness 0 Minor Usefulness 1 Moderate Usefulness 2 Significant Usefulness 3 Highly Useful 4 Critical 5

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 15 Value of Target to Terrorist None 0 Very Low 1 Low 2 Medium 3 High 4 Very High 5

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 16 Access to Target (0) Fenced, Guarded, Controlled Access by Pass Only, No Vehicle Parking within 50 Feet (1) Guarded, Controlled Access of Visitors and Non- Staff Personnel, No Vehicle Parking within 50 Feet (2) Protected, Controlled Access of Visitors and Non- Staff Personnel, No Unauthorized Vehicle Parking within 50 Feet (3) Controlled Access of Visitors, Unprotected Entry, No Unauthorized Vehicle Parking within 50 Feet (4) Open Access to all personnel, Unprotected Entry, No Unauthorized Vehicle Parking within 50 Feet (5) Open Access to all personnel, Unprotected Entry, Vehicle Parking within 50 feet

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 17 Site Population Capacity 0 (0) 1 – 250 (1) 251 – 500 (2) (3) 1001 – 5000 (4) > 5000 (5)

Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 18 Potential for Collateral Mass Casualties 0 to 100 (0) 101 to 500 (1) 501 to 1000 (2) 1001 to 2000 (3) 2001 to 5000 (4) > 5000 (5)