State Homeland Security Assessment and Strategy Program Risk Assessment Process.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Homeland Security and Law Enforcement Created By: Ashley Spivey For _Local_Actions_for_Homeland_Security.pdf.
WMD Crime Scene Management
WMD Crime Scene Management
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
Chapter 13 Crimes Against the State Joel Samaha, 9th Ed.
Visual 8.1 Terrorism and CERT  Define terrorism.  Identify potential targets in the community.  Identify CERT operating procedures for a terrorist incident.
State Homeland Security Assessment and Strategy Program 2.1 State Homeland Security Assessment and Strategy Process State Homeland Security Program.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
Fiscal Year 2008 Urban Areas Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
State Homeland Security Assessment and Strategy Program State Process and SHSS.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
“Who’s In Charge?” “THE COMMAND SECTION”. The Incident/Unified Commander Incident/Unified Commander(s) provides direction and guidance through:  Key.
State Homeland Security Assessment and Strategy Program Regional Roll-out San Francisco, CA June 17-18, 2003.
PREPARE AMERICA for a Unified Response to Terrorism A NATIONAL HOMELAND SECURITY PREPAREDNESS TRAINING SOLUTION OFFERED BY AMERICA’S COMMUNITY COLLEGES.
Preliminary Assessment Tribal Emergency Response Preparedness Dean S. Seneca, MPH, MCURP Agency for Toxic Substances and Disease Registry Centers for Disease.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
State Homeland Security Assessment and Strategy Program Agricultural Assessment Component.
Part of a Broader Strategy
Jeffery Graviet Emergency Services Coordinator, Salt Lake County Chairperson, Salt Lake Urban Area Working Group.
Worker Focused Safety Program Violence in the Workplace Worker Training Module 3.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
U.S. Department of Homeland Security Chemicals of Interest Anti-terrorism Standard.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
State Homeland Security Assessment and Strategy Program Develop Planning Factors for CBRNE Scenarios.
Agricultural Investigations Law Enforcement Perspective.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Port Security Safeguarding ISPS Drills & Exercises Workshop
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Terrorism. What is Terrorism? Terrorism is a criminal act that influences an audience beyond the immediate victim. The strategy of terrorists is to commit.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Technician Module 2 Unit 7 Slide 1 MODULE 2 UNIT 7 Law Enforcement & Investigations.
STANKIEWICZ. Essential Questions and Learning What is the purpose of criminal Investigation? What are the basic steps in criminal investigations? What.
Terrorism & Bioterrorism Communication Challenges Module 9.
Hazardous Materials Response Team Unit Operational Response Section.
Technician Module 2 Unit 1 Slide 1 MODULE 2 UNIT 1 Introduction & Review.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
MODULE 3 Composition & Roles. TAT TEAM APPROACH UPON COMPLETION OF THIS MODULE, PARTICIPANTS SHOULD UNDERSTAND: 3 – 2  Composition of the Threat Assessment.
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Civil Liability and Policing Challenges.  Any questions about anything before we begin?  Unit 7: Seminar, Discussion, Quiz, and Unit 7 Project Chapters.
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Citizen Corps Citizen Corps areas of emphasis: Crime Natural disasters
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
WMD Operations Unit 1 slide 1 MODULE 2 UNIT 1 Training at the Awareness Level Review.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
DHS/ODP OVERVIEW The Department of Homeland Security (DHS), Office for Domestic Preparedness (ODP) implements programs designed to enhance the preparedness.
1 Portland Office of Emergency Management (POEM) Urban Areas Security Initiative State Homeland Security Office of Domestic Preparedness - Grant Programs.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Chapter 16 Terrorism and National Security.
Risk Assessment Process
Preliminary Assessment Tribal Emergency Response Preparedness
Disaster and Emergency Management
MODULE 2 UNIT 4 Working at the Scene Allow 30 minutes for this section.
Citizen Corps Citizen Corps areas of emphasis: Crime Natural disasters
Joint Force Headquarters-Michigan CCIRs and PIRs
Disaster Preparedness
What is terrorism? There is no agreed definition of terrorism internationally. The UK’s Terrorism Act 2000, defines terrorism as: The use or threat of.
Joint Force Headquarters-Michigan CCIRs and PIRs
Federal Protective Service
MODULE 2 UNIT 1 Introduction & Review Instructor Notes.
MODULE 2 UNIT 2 Incident Command Allow 60 minutes for this section.
Training at the Awareness Level Review
Prevention, Intelligence
MODULE 2 UNIT 4 Working at the Scene Allow 30 minutes for this section.
Presentation transcript:

State Homeland Security Assessment and Strategy Program Risk Assessment Process

State Homeland Security Assessment and Strategy Program 5.2 How Does “Threat” Fit into the Homeland Security Strategic Planning Process? Threat Assessment

State Homeland Security Assessment and Strategy Program 5.3 Threat Assessment Risk Assessment Needs Assessment Shortfalls or “Gaps” Desired Capabilities Current Capabilities Vulnerability Assessment Threat Assessment State Administrative Agency

State Homeland Security Assessment and Strategy Program 5.4  PTE Defined  Groups or individuals indicating the unlawful use of force or violence  Specifically the utilization of a WMD…  To intimidate or coerce…  Government or civilian population…  Political or social purposes Threat Assessment R E F E R E N C E : Jurisdiction Handbook page 11

State Homeland Security Assessment and Strategy Program 5.5  Weapons of Mass Destruction (18 USC 2332a) Defines a weapon of mass destruction as (1) any destructive device as defined in section 921 of this title, [which reads] any explosive, incendiary, or poison gas, bomb, grenade, rocket having a propellant charge of more than four ounces, missile having an explosive or incendiary charge of more than one-quarter ounce, mine or device similar to the above; (2) poison gas; (3) any weapon involving a disease organism; or (4) any weapon that is designed to release radiation or radioactivity at a level dangerous to human life. Threat Assessment

State Homeland Security Assessment and Strategy Program 5.6  Threat Working Group  Law enforcement personnel/intelligence components  Consider all appropriate personnel/agencies  Additional participants should be limited to subject matter experts who advise on terrorism related issues  FBI WMD Coordinator  FBI Joint Terrorism Task Force  Provide information on motives and capabilities of PTE Threat Assessment

State Homeland Security Assessment and Strategy Program 5.7  Joint Terrorism Task Force  Combines federal, state and local law enforcement  Develop cohesive strategy for identifying, investigating and prosecuting terrorists  Intelligence collection and analysis to prevent terrorist acts  66 JTTF’s nationwide Threat Assessment

State Homeland Security Assessment and Strategy Program 5.8  FBI WMD Coordinator  Located within FBI field offices  Assist state and local jurisdictions with identifying WMD threat elements  Assist state and local jurisdictions in their establishment of policies and procedures established for responding to WMD terrorist attacks  Liaison to the Joint Terrorism Task Force Threat Assessment

State Homeland Security Assessment and Strategy Program 5.9 Threat Assessment Law Enforcement On-line (LEO)

State Homeland Security Assessment and Strategy Program 5.10  Safeguards  Information sharing limited to working group  No recording or forwarding of sensitive information  Alternatives recognized but require submission using existing format Threat Assessment

State Homeland Security Assessment and Strategy Program 5.11  Cautions  “Snapshot” of current operational activity within jurisdiction  Assessment does not warrant opening an investigation  Lone offenders and splinter groups should be considered  Different interpretations of threat factors  Tendency to “inflate” results Threat Assessment

State Homeland Security Assessment and Strategy Program 5.12  Threat Assessment Process  Assessment completion off-line  Organize threat working group  PTE existence  Past violent history  Evidence of intentions  Evidence of capability  Evidence of targeting  Jurisdiction threat rating (highest threat)  On-line entry of threat rating Threat Assessment R E F E R E N C E : Jurisdiction Handbook page 12

State Homeland Security Assessment and Strategy Program 5.13  Document Threat Working Group  Jurisdiction population and coordinating agency  POC for Threat Working Group  Working group agencies  FBI/Joint Terrorism Task Force participation Threat Assessment R E F E R E N C E : Jurisdiction Handbook page 14

State Homeland Security Assessment and Strategy Program 5.14 Threat Assessment Factors  Existence:  The presence of a group or individual, operating within the jurisdiction… Threat Assessment

State Homeland Security Assessment and Strategy Program 5.15  History:  Demonstrated past terrorist activity over time or a recorded, violent criminal history… Threat Assessment

State Homeland Security Assessment and Strategy Program 5.16  Intentions:  Credible advocacy/threats of force or violence, acts, preparations to act; evidencing intent to create a WMD, carry out a plan to release a WMD, or to participate in a WMD incident Threat Assessment

State Homeland Security Assessment and Strategy Program 5.17  Capability:  Credible information that a specific PTE possesses the requisite training, skills, finances, and access to resources needed to develop, produce, or acquire a particular type of WMD in a quantity and/or potency sufficient to produce mass casualties, combined with information substantiating the PTE’s ability to safely store, test, and deliver the same Threat Assessment

State Homeland Security Assessment and Strategy Program 5.18  Targeting:  Credible information indicative of preparations for specific terrorist operations against identifiable targets located within the specified jurisdiction Threat Assessment

State Homeland Security Assessment and Strategy Program 5.19 Threat Factor Values Threat Assessment R E F E R E N C E : Jurisdiction Handbook page 16

State Homeland Security Assessment and Strategy Program 5.20  Assess PTE Motivations  Political  Religious  Racial  Environmental  Special Interest Threat Assessment

State Homeland Security Assessment and Strategy Program 5.21  Identify WMD Capabilities of PTE  Chemical  Biological  Radiological  Nuclear  Explosive Threat Assessment CBRNE

State Homeland Security Assessment and Strategy Program 5.22 Threat Assessment Jurisdiction Threat Worksheet Threat Factors Threat Level (1-10) Motivation P=Political R=Religious E=Environmental Ra=Racial S=Special Interest Choose one or more WMD Categories C=Chemical B=Biological R=Radiological N=Nuclear E=Explosive Choose one or more PTE Existence (1) Violent History (1) Intentions (2) WMD Capability (2) Targeting (4) PTE 1 112RaE PTE 2 PTE 3

State Homeland Security Assessment and Strategy Program 5.23  Jurisdiction Threat Profile process  Number of PTE  Existing PTE capabilities  WMD Threat History  Jurisdiction Threat Rating Threat Assessment R E F E R E N C E : Jurisdiction Handbook page 18

State Homeland Security Assessment and Strategy Program 5.24  Step 1 - Number of PTE  PTE assessed in your jurisdiction  If no known PTE - a rating of zero is recorded here Threat Assessment Total Number of PTE

State Homeland Security Assessment and Strategy Program 5.25  Step 2 - Existing PTE capabilities  Document PTE capabilities  CBRNE Threat Assessment ChemicalNuclear BiologicalExplosive RadiologicalNone

State Homeland Security Assessment and Strategy Program 5.26  Step 3 - WMD Threat History  Document threat history  January 1, 2000 to December 31, 2002 Threat Assessment Threatened WMD Hazard Total Number of Responses to Suspected WMD Threats and/or Incidents Number of WMD Threats and/or Incidents Determined to be Criminal Chemical Biological Radiological Nuclear Explosive

State Homeland Security Assessment and Strategy Program 5.27  Step 4 - Threat Rating  Jurisdiction threat rating  Highest threat level Threat Assessment Jurisdiction Threat Rating

State Homeland Security Assessment and Strategy Program 5.28 DISCUSSION Threat Assessment

State Homeland Security Assessment and Strategy Program 5.29 How Does “Vulnerability” Fit Into the Homeland Security Strategic Planning Process? Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.30 Basic Vulnerability Assessment Risk Assessment Needs Assessment Shortfalls or “Gaps” Desired Capabilities Current Capabilities Threat Assessment Vulnerability Assessment State Administrative Agency

State Homeland Security Assessment and Strategy Program 5.31  Vulnerability Defined  The process of identifying any weaknesses that can be exploited by an adversary to gain access or information  Vulnerabilities can result from, but are not limited to:  Building characteristics  Equipment properties  Personal behavior  Operational practices Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.32  Potential Targets  Facilities  Sites  Systems  Special events Basic Vulnerability Assessment R E F E R E N C E : Reference Handbook page B-10

State Homeland Security Assessment and Strategy Program 5.33  Vulnerability Working Group  Multi-discipline members  Include personnel who can provide specific information unique to potential target Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.34 Basic Vulnerability Assessment 4 Step Process Identify Potential Targets Critical Assets List Top 10% (10 or less – all targets) Determine Jurisdictional Vulnerability Highest Worksheet Rating Jurisdiction Vulnerability Rating Conduct Individual Target Vulnerability Assessments Vulnerability Assessment Worksheets 7 Assessment Factors Organize the Assessment Team Multidiscipline members Working knowledge of facilities, sites, systems, or special events R E F E R E N C E : Jurisdiction Handbook page 20

State Homeland Security Assessment and Strategy Program 5.35  Seven Factors Used to Assess Vulnerability  Level of visibility  Criticality of target site to jurisdiction  Impact outside of the jurisdiction  PTE access to potential target  Potential target threat of hazard  Potential target site population capacity  Potential for collateral mass casualties Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.36  Step 1 - Assess the awareness of the existence and visibility of the target to the general public Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.37  Step 2 - Assess usefulness of assets to local population, economy, government, etc. Potential targets deemed essential to the continuity of the jurisdiction Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.38  Step 3 - Assess the effect loss will have outside of the jurisdiction Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.39  Step 4 - Assess the availability of the target for ingress and egress by a PTE Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.40  Step 5 - Assess the presence of legal WMD material (CBRNE) in quantities that could be the target of a terrorist attack or would complicate the response to an incident at that facility Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.41  Step 6 - Assess the maximum number of individuals at a site at any given time Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.42  Step 7 - Assess potential collateral mass casualties within a one-mile radius of the target site Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.43  Summary score  Rating key  Enter target rating  Document rating for each target Basic Vulnerability Assessment Summary Score _____Visibility _____Criticality _____Impact Outside Jurisdiction _____PTE Access to Target _____Potential Target Threat _____Potential Site Population _____Potential for Collateral Mass Casualties ____ TOTAL Basic Target Vulnerability Assessment Rating Key pts. = pts. = pts. = pts. = pts. = pts. = pts. = pts. = pts. = pts. = pts. = pts. = 12 Target Name or Number: Rating

State Homeland Security Assessment and Strategy Program 5.44  Final vulnerability rating  Highest vulnerability rating of all site/targets  Include raw score Basic Vulnerability Assessment Jurisdiction Vulnerability Rating Basic Vulnerability Summary Raw Score (Highest Target Score) Basic Vulnerability Rating R E F E R E N C E : Jurisdiction Handbook page 25

State Homeland Security Assessment and Strategy Program 5.45  Legal Hazards:  Adhere to CBRNE definitions Basic Vulnerability Assessment CBRNE Material Number of sites located in jurisdiction Chemical (Tier II) Biological (Infectious Only) Radiological Nuclear Explosive

State Homeland Security Assessment and Strategy Program 5.46  Critical Infrastructure Assessment  IAIP in conjunction with the TSA desire to collect Vulnerability Worksheets  Need to compile a national list of valuable assets  USSS Key Asset Program contact  FOIA considerations Basic Vulnerability Assessment

State Homeland Security Assessment and Strategy Program 5.47  Site-Specific Vulnerability Assessment  Survey for ODP  Specialized assessment to harden target  Estimates future assessments required  By jurisdiction Basic Vulnerability Assessment R E F E R E N C E : Jurisdiction Handbook page 27

State Homeland Security Assessment and Strategy Program 5.48 DISCUSSION Basic Vulnerability Assessment