F/SUPT HERBERT B CEZAR D i r e c t o r Fire National Training Institute (FNTI)

Slides:



Advertisements
Similar presentations
Public Health and Healthcare Issues. Public Health and Healthcare.
Advertisements

Museum Presentation Intermuseum Conservation Association.
Hazard, Threats, Risk, Etc. An examination of some key terms … Walter G. Green III, Ph.D., CEM Disaster Theory Series No. 3 Copyright 2008 by Walter G.
Reliability of the electrical service Business Continuity Management Business Impact Analysis (BIA) Critical ITC Services Minimum Business Continuity Objective.
Copyright © Allyn & Bacon 2010 Global Social Problems: War and Terrorism This multimedia product and its contents are protected under copyright law. The.
USC Health and Safety Training Workplace Violence.
Chapter 13 Crimes Against the State Joel Samaha, 9th Ed.
Visual 8.1 Terrorism and CERT  Define terrorism.  Identify potential targets in the community.  Identify CERT operating procedures for a terrorist incident.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
City of Leesburg Electric Department City of Leesburg Electric Department CIP-001 Sabotage Reporting.
1 Continuity Planning for transportation agencies.
EMI SIG Training Subcommittee Categorization and Classification Overview for Offsite Agencies November 2013.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
MAXWELL SECURITY AUTHORITY. THE THREAT: The TERROR PLOT of AL QAEDA.
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
Randy Marchany VA Tech Computing Center
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Critical Infrastructure Protection and Higher Education: University of California Hazard Vulnerability Assessment Kristine Hafner University of California.
International Health and Safety at Work
Security Services Constitutional Issues in Private Security.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Road Ranger / TMC Operator Joint Training Module 111 Module 11 Module 11 System Security.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Sutton Public Schools Anti-Bullying Law Overview.
Hazards and Disaster Management
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
IAFS 1000 Terrorism. Dinner See evite Paper Presentations Dec min. talk, 6 min. Q&A Clearly and concisely summarize: –Argument –Evidence (analysis.
EMERGING THREATS TO HUMAN SECURITY IN AFRICA
Institute for Security Studies Institute for Security Studies Submission on the Anti-Terrorism Bill Some Comments and Suggested Approaches.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Chapter 17 - Defining Terrorism. Terrorism in the US prior to 9/11 Bombings with the Union movement - Haymarket Square Have any presidential assassinations.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
International Human Rights and Humanitarian Law 101 Jennifer Prestholdt Deputy Director, The Advocates for Human Rights.
Session 181 Risk Analysis RISK = LIKELIHOOD X CONSEQUENCE.
Terrorism & Bioterrorism Communication Challenges Module 9.
Developing a Security Program. Exercise Plan Develop/Update Plan Review/Revisit Plan.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
IAFS 1000 Terrorism.
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
Instruments concerning new and emerging threats to civil aviation Julie Atwell 4 June 2010 Achieving a just and secure society Achieving a just and secure.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
ASDPE International Health Regulations (IHR 2005) Laboratory and Zoonosis update Dr Richard Brown, WHO Thailand Workshop on Laboratory Diagnosis for Zoonotic.
Citizen Corps Citizen Corps areas of emphasis: Crime Natural disasters
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
Utilities and Crisis Management June 13, 2015 Carolyn Bermudez Vice President and General Manager, Operations.
Chapter 17: Foreign Policy and National Defense Section 2.
Risk assessment and Natural Hazards. Concept of vulnerability (e.g. fatalities in two contrasting societies) Deaths 1 …………………………………………
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
 War  Guerrilla war  Terrorism  Coups d’état  Assassination  Economic/property damage  Sabotage  Riot Continuum 1.
Disaster and Emergency Management Security Services.
Virginia RULES Teens Learn & Live the Law Crimes Against Persons.
Risk Assessment: A Practical Guide to Assessing Operational Risk
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
Disaster and Emergency Management
Middle East Relations And Terrorism
Citizen Corps Citizen Corps areas of emphasis: Crime Natural disasters
Joint Force Headquarters-Michigan CCIRs and PIRs
Disaster Preparedness
Research Project Overview
Joint Force Headquarters-Michigan CCIRs and PIRs
Air Carrier Continuing Analysis and Surveillance System (CASS)
Disaster and Emergency Management
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
4th Quarter 2016 Earnings Call
CRIME AGAINST THE STATE TERRORISM
Unit 1 Emergency Procedures.
Presentation transcript:

F/SUPT HERBERT B CEZAR D i r e c t o r Fire National Training Institute (FNTI)

It is the premeditated, threatened, actual use of violence, force, or by any other means of destruction perpetrated against person/s, property/ies, or the environment. It is committed by any person or group of persons, whether natural or juridical, who, with intent to create or sow danger, panic, fear or chaos to the general public or a group of persons or particular person, or to coerce or intimidate the government to do or to abstain from doing an act.

Threatening or causing death or serious bodily harm (on person or persons); Threatening or causing serious risk to health or safely of (the public or any segment of the public; Threatening or causing substantial damage or wanton destruction or resorting to arson on critical infrastructure or property, public or private; Threatening or causing serious interference with or serious disruption of an essential service, facility or system, whether public or private, other than a result of lawful advocacy, protest, dissent or stoppage of work; Hijacking or threatening to hijack any kind of aircraft, electric or railroad train, locomotive, passenger bus or oilier means of mass transportation, or public conveyance, or piracy of ship or sea vessel;

Taking or threatening to kidnap or deprive any person of his/her liberty; Assassinating or threatening to assassinate, or kidnapping or threatening to kidnap the President or the Vice President of the Philippines, the President of the Senate, the Speaker of the Mouse of Representatives or the Chief Justice of the Supreme Court; Killing or violently attacking an internationally protected person or depriving the liberty of such person in violation of the Convention on the Protection and Punishment of Crimes Against Internationally Protected Persons, including Diplomatic Agents, and oilier international agreements;

Attacking or threatening to attack the cyberspace, by destroying the actual machinery of the information and communication infrastructure, disrupting the information technology underlying the internet, government or private networks or systems, or committing any unlawful act against networks, servers, computers or other information and communication systems; Wilfully destroying the natural resources in land, water and air, such as forests or marine and mineral resources, or intentionally causing oil or toxic spillages, or other similar acts of destruction against the environment that threatens ecological security;

Unlawfully manufacturing, processing, selling, acquiring, possessing, using, diverting, supplying or transporting chemical, biological, radiological or nuclear agents, or equipment and instruments used in their production, distribution, release or spread that would endanger directly or indirectly the safety of one or more individuals, or to cause mass destruction or great damage to property; or Unlawfully manufacturing, selling, acquiring, supplying, disposing, using or possessing explosives, bombs, grenades, projectiles, devices or other lethal weapons, or substances or machinery used or intended to be used for the manufacture of explosives in furtherance of, or incident to, or in connection with an act of terrorism defined herein.

BALI BOMBING October 2002

WORLD TRADE CENTER September 2001

Bus exploded into flames at least 3 persons killed Blast hit outside Gaisano Mall at least 3 persons killed “Mini-9/11 in the Philippines” 2005 Valentine’s Day Bombings “Mini-9/11 in the Philippines” Bomb detonated at a bus terminal 1 person killed

SUPERFERRY14 BOMBING February 2004 “the WORLD's fourth deadliest terrorist strike since September 11, 2001, and ASIA's worst since the Bali bombings of October 2002”. -TIME MAGAZINE AUGUST 2004

LIST OF BOMBING ACTIVITIES THAT TRANSPIRED IN 2006

July 11, 2006 Mumbai, India eight coordinated explosions during the evening rush hour 190+ killed and hundreds injured. July 10, 2006 Sao Paulo, Brazil bomb Injures exploded inside a subway train More than 10 injured July 5, 2006 Yakhroma, Russia bomb exploded at a Muslim prayer house no casualties reported June 26, 2006 Suicide Attack in Colombo, Sri Lanka A top Sri Lankan general was killed along with several others June 24, 2006 Bangkok, Thailand two bombs exploded near the Thai Rak Thai (TRT) party headquarters

June 23, 2006 Sharif Aguak, Mindanao bomb exploded near a public market 5+ people killed and 10 injured June 20, 2006 an explosion that occurred on a Makati street One injured June 13, 2006 pillbox bomb exploded inside Camp Bagong Diwa no reports of injuries a SWAT van sustained damage June 11, 2006 Lipa, Batangas grenade inside a bag exploded outside of a market at least nine people injured June 11, 2006 Commonwealth Avenue, Quezon City homemade bomb exploded near a parked bus no reports of injuries; bus sustained significant damage

June 11, 2006 Plaza Lawton, Manila explosion hit a police station June 9, 2006 Pampanga grenade attack on the residence of a PGMA supporter June 6, 2006 Makati City improvised explosive device detonated outside the Great Pacific Life Bldg no reports of injuries March 29, 2006 Digos City, Davao del Sur bomb exploded inside a bus at least 17 people were injured the bus and three nearby vehicles sustained damages

March 27, 2006 a bomb exploded in Jolo, Sulu 9 people killed, 20 others injured February 20, 2006 an explosion occurred inside the gates of Malacañang, Manila no reports of damage or injuries February 18, 2006 Jolo, Sulu a bomb exploded at a karaoke bar located several meters from an army base where US soldiers are participating in joint exercises with the AFP 1 person killed; 28 others injured January 30, 2006 Ermita, Manila a small improvised explosive device detonated in front of the Court of Appeals Bldg no reports of damage or injuries

Types of Threats Any inimical act and/or unwanted event, which may bring about adverse results. NATURAL MANMADE TECHNOLOGICAL Typhoon Volcanic Eruption Earthquake Flood Erosion TERRORISM Sabotage Technical or Financial Fraud Coup d’ Etat/Rebellion Labor Strike War Plant Breakdown Breakdown or Failure of Protective Devices Environmental Hazards

Nation Person Organization Infrastructures Community Key Assets Operations Subjects of Threats

Transport Terminals Public Conveyances Telecom Facility Power Facilities Water Supply Facilities Government Buildings Movie Houses & Malls Business Facilities Medical/Health Facilities Emergency Service Facilities Road Infrastructures Religious Institutions Educational Institutions Markets Areas of Threats

A condition used to describe the openness or weakness of a subject of a threat. The condition of vulnerability is directly influenced by the strength or weaknesses of a security or protective program. The chance that a given threat will occur and bring about adverse consequences.

Importance of a subject of a threat as defined by its nature. Importance is directed towards: a. The subject of a threat itself b. Community and citizenry c. Any or all aspects of National Security

Tangible and intangible outcome or consequence of a threat occurrence, such as loss, injury, disadvantage or gain. The product of threat probability and the sum of impact of a threat occurrence that can be inflicted against a target of an identified threat.

The systematic and logical study of a given threat, its likelihood of occurrence and the severity of its impact, purposely for the formulation and implementation of an effective and efficient security program to detect, control or prevent losses.

the probability that an undesirable event or threat may actually take place and inflict adverse consequences, including the failure to achieve goals and objectives. One is at RISK when: there is a threat the threat is probable to occur consequences if threat occurs

1 ST STEP 2 ND STEP 3 RD STEP 4 TH STEP

The 1 st Step of Risk Analysis involves the identification and profiling of a threat.

THREAT Helps in designing an effective and efficient security or protective program. Who offers the threat? Why the threat? Objectives of the source of threat? Likely specific targets? Modus Operandi?

 Internal & External Environment  Criticality or Nature of the Subject of Threat  Historical Incidents/Events are specific conditions that identify a threat. Also, they directly or indirectly influence the potential of a threat to exist or be present.

Nature & Criticality of Facility Operational Significance Financial or Business Significance Security Classification Work or Input-Output processes and sensitive areas Critical infrastructures and key assets (plus costs) Financial Status and Financial Operations Implications to national security, economy, politics, etc.

EXTERNAL INTERNAL Environment Politico-socio-economic situations Geography, topography, etc Demography Presence of PNP, AFP and Emergency Response Agencies and their capabilities Presence of sources of threats in the area Global Situation Structural Design Landscaping Facility Occupants Facility Contents Security Personnel & their capabilities Presence of sources of threats inside the facility Organization

Internal Incidents External Incidents Security Dept Other Depts Government Private Historical Event Near-miss events Actual events Historical Event

RATINGLEVEL 1 – 2Very Low 3 – 4Low 5 – 6Medium 7 – 8High 9 – 10Very High Example:RATING 1.The facility provides electricity in entire Luzon.-7 2.The facility is located in an NPA-infested area.-9 3.The facility was attacked by NPA’s in Average Threat Potential=8

. The 2 nd Step of Risk Analysis involves the identification and measurement of the weaknesses of the existing security or protective program of a subject of a threat, as against the strength of the same security or protective program.

Allows risk owners to know the strength of their existing Security Program, what needs to be corrected and what more are necessary to be put in place in defense against an identified threat. Vulnerability directly influences the probability of a threat to actually take place. WEAK SECURITY Increases probability of threat occurrence STRONG SECURITY Reduces probability of threat occurrence

absence of security or protective measures inadequacy of security or protective measures defective security or protective measures are specific security conditions that weakens or strengthens the security/protective program of a target of threat.

RATINGLEVEL 1 – 2Very Low 3 – 4Low 5 – 6Medium 7 – 8High 9 – 10Very High Example:RATING 1.No security guards are employed.-7 2.Perimeter fence is below standard of 8 feet.-9 3.Personnel Control Policy is not strictly enforced.-8 Average Vulnerability=8 to empirically estimate the vulnerability of a target of threat.

The 3 rd Step of Risk Analysis The probability that an identified threat is going to actually take place is measured using empirical parameters and tool.

Threat Factors (Threat Potential) Threat Factors (Threat Potential) Vulnerability Factors Vulnerability Factors specific conditions that influence the probable occurrence of an identified threat.

PROBABILITY = Average Rated Threat Factors X Average Rated Vulnerability Factors 100 VULNERABILITYRATI NG 1. Facility does not have fence Facility does not have guards -7 AVERAGE=8 PROBABILITY = 7.5X PROBABILITY = 0.60 or 60% THREAT FACTORSRATIN G 1. Facility located in NPA area Facility already attacked once -8 AVERAGE=7.5 EXAMPLE: Probability of Terrorist Attack to occur

PROBABILI TY LEVELDESCRIPTION 0.00Improbable Given no changes, threat will not occur Very Low Least chance of occurrence LowOccurrence is less likely Moderate There is 50:50 chance of occurrence High Occurrence is much greater Virtually Certain Given no changes, threat will certainly occur.

The 4 th Step of Risk Analysis The possible impact of a threat occurrence and their severity are identified and measured.

Failure to achieve organizational goals & objectives Loss of lives Destruction or loss of infrastructures & key assets Destruction, disruption or loss of systems/operations Income losses Loss of information and competitive edge Loss of image, goodwill and reputation Adverse implications to all or any aspects of National Security GENERAL IMPACT

Geographic dispersion of potential damages Temporal extension of potential damages Requirements of restoring the situation to the state before the damages occurred (i.e., reforestation and detoxification of water) Violation of individual, social or cultural interests and values generating social conflicts and psychological reactions from those who feel inflicted by the risk consequences systems/operations OTHER IMPACTS THAT NEED TO BE CONSIDERED

Quantitative Lives lost & Cost Downtime period & cost Lost income Replacement Cost Restoration Cost Cost of property destroyed Qualitative Reputation Goodwill Patronage loss Morale loss Effects to others PUTTING VALUE TO IMPACT

IMPACT SEVERITY = Average (Quantitative + Qualitative) X Probability SAMPLE CASE QUANTITATIVERATING 1.Building destruction worth P10.0M-5 2.Income loss/day equal to P2.0M-4 3.Death & injuries-5 QUALITATIVE 1. Stoppage of services Loss of reputation/image Patronage loss -5 AVERAGE IMPACT/LOSS RATING=4.70 PROBABILITY=0.60 IMPACT SEVERITY = ( ) X 0.60=3.0 6

RATI NG LEVELDESCRIPTION 1 Improbab le Effect is insignificant. 2Low Can be covered by normal contingency services. Short discontinuance of operation. 3Moderate Noticeable impact on earnings. Requires attention of top management. 4 Very Serious Major impact on balance sheet account. Requires changes in investment policy. 5Fatal Prolonged discontinuance of operation. Requires re-capitalization.

Threat TERRORIST ATTACK Threat Potential Rating Level: HIGH 8.00 Vulnerability Rating Level: HIGH 8.00 Impact Level: FATAL 4.70 Impact Severity Level: MODERATE 3.00 Threat Probability Level: MODERATE 0.60

In a complex and rapidly changing world, the day can instantly turn from friendly to hostile in a least expected time and with serious consequence … …thus, constantly “penetrating the fog of the future”, and managing the dangers beyond is a vital priority for all of us!

F SR/SUPT HERBERT B CEZAR D i r e c t o r Fire National Training Institute (FNTI)