Standardized Awareness Authorized Training, Train-the-Trainer Prevention and Deterrence.

Slides:



Advertisements
Similar presentations
Protective Security Advisors Securing the Nations critical infrastructure one community at a time.
Advertisements

Standardized Awareness Authorized Training, Train-the-Trainer Chemical Agents.
Idaho Critical Infrastructure and Key Resources Protection Program and Fusion Center Brief.
National Incident Management System Law Enforcement II.
ALERT: The Basics Food and Drug Administration Center for Food Safety and Applied Nutrition.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
Partnership for Critical Infrastructure Security PCIS Mission: The mission of the Partnership for Critical Infrastructure Security (PCIS) is to coordinate.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
US Army Corps of Engineers BUILDING STRONG ® Ty Brumfield (LNO to FEMA –RSF-IS National Coordinator Office of Homeland Security Directorate of Contingency.
Roundtable on Security & Terrorism - Industry Perspective M. J. Garrett, CIH Manager - Corporate Safety Carolinas HealthCare System Spring Meeting Carolinas.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
Objectives Discuss the types of Improvised Explosive Devices (IED) and the explosives and components used to make them. Identify the types of explosive.
Standardized Awareness Authorized Training, Train-the-Trainer Biological Agents.
Good Hygiene Practices along the coffee chain The Codex General Principles of Food Hygiene Module 2.3.
Hazardous Materials Transportation
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
Protecting your Employees and Securing your Mail Center.
©2009 Susan B. Harwood Grant Safety Management Systems Safety Management Worksite Analysis Management Commitment and Employee Involvement Hazard Prevention.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Ship Recycling Facility Management System IMO Guideline A.962
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
The City and Security Era 1--The Walled City: 500 AD to 1700 Era 2--The Unwalled City: 1700 to 9/11/2001 Era 3--Securing the Unwalled City: April 8, 2003.
Objectives Describe radioactive materials, exposure, contamination, and the physiological signs and symptoms of radiation exposure. Discuss radiation.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
IAEA International Atomic Energy Agency Reviewing Management System and the Interface with Nuclear Security (IRRS Modules 4 and 12) BASIC IRRS TRAINING.
CRITICAL INFRASTRUCTURE & CONTINUITY OF OPERATIONS IN A POST 9/11 WORLD Presented by: Dr. Pamela Collins, EKU/JSC.
Food Safety Professional Development for Early Childhood Educators Evaluation Plan.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Catastrophe Readiness and Response Session 7b 1 Session 7b Critical Infrastructure Drew Bumbak.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
U.S. Department of Homeland Security Brief to the Inter Agency Board Incident Management and Communications Subgroup Oct 22, 2010 Pete Owen, PSA San Diego.
1 Session 7, Section 2 Critical Infrastructure Drew Bumbak.
IAEA International Atomic Energy Agency. IAEA Outline Learning Objectives Introduction IRRS review of regulations and guides Relevant safety standards.
CI/KR Public-Private Partnerships Overview March 2010 Prepared By: Thomas DiNanno International Assessment and Strategy Center.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
A-16 Data Theme Gaps for Homeland Security and Homeland Defense Mike Lee - FGDC Homeland Security Working Group January 15, 2008.
CARVER+Shock Vulnerability Assessment Tool “As Agile As the Enemy” The Foundation for Institutional Development.
CIFOR Council to Improve Foodborne Outbreak Response CIFOR Guidelines and CIFOR Toolkit Donald J. Sharp, MD, DTM&H Food Safety Office National Center for.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
© Module 4—Hazard Prevention and Control Safety Management Worksite Analysis Management Commitment and Employee Involvement Hazard Prevention and.
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Environment and Disaster Planning Hari Srinivas, GDRC Rajib Shaw, Kyoto University Contents of the presentation: -What is the problem? -Precautionary Principles.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Emergency Response to Terrorism: Federal Emergency Management Agency United States Fire AdministrationNational Fire Academy Basic Concepts.
Boston – June 12 th. 2 Joe Rozek Microsoft Corporation.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
1 Setting the Stage to Discuss the Framework for the A-16 Geospatial Data Portfolio Lifecycle WG September 1, 2009.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Unit 4 Safety at Specialized Incidents & Postincident Safety Management Chapter 7 and 8.
Risk MAP Discovery Meeting Coos County, Oregon May 12, 2016.
Critical Infrastructure Protection Market by Security Technology & Region
Security Partnership By Kevin Hegner Public Private.
SEC 470 OUTLET The learning interface/sec470outletdotcom.
Pre-Event Planning Unit 2. Visual 2.1 Unit 2 Overview This unit describes:  When communities should begin planning for a special event.  The concept.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
CORPORATE EMERGENCY ACCESS SYSTEM
Disaster and Emergency Management
Hazardous Materials: Overview (Fire Fighter I)
Installing and Maintaining Equipment
Terrorism Training for Law Enforcement
Installing and Maintaining Equipment
The U.S. Department of Homeland Security
MIMOSA Open Meeting Standards-based Critical Infrastructure Risk Management Alan Johnston.
Training at the Awareness Level Review
Prevention, Intelligence
Civil Air Patrol Critical Infrastructure Austin Worcester 15 Jul 2019.
Presentation transcript:

Standardized Awareness Authorized Training, Train-the-Trainer Prevention and Deterrence

Objectives  Define terrorism and WMD.  List actions indicating potential terrorist activity.  Describe a suspicious object.  Identify critical infrastructure and key resources (CIKR) sectors and why terrorists would target them.  Discuss the recognize, avoid, isolate, and notify concept.  Discuss instructional strategies for facilitating the “Prevention and Deterrence” module. 1

Terrorism and WMD International and domestic terrorism  Title 18 United States Code (U.S.C.) Chapter 113B Section 2331 WMD  Title 18 U.S.C. Chapter 113B Section 2332a 2 Photo courtesy of FEMA/Bill Koplitz

Elements of Threat  Surprise (relative to time and date of attack)  Means of attack  Target of the attack  Significant dates  Foreknowledge of the community response 3 Photo courtesy of FEMA/Andrea Booher

Threat Indicators Four most common terrorist activities  Gathering target intelligence  Acquiring materials necessary for an attack  Preparing materials  First steps of executing an attack 4

Suspicious Objects To determine the nature of the suspicious object, responders may  Talk to witnesses  View closed-circuit television recordings  Check with the sender or mail company for postal items  Examine the package for wires or electronic components that are visible 5 mail/Security.aspx

Critical Infrastructure and Key Resources  Agriculture and Food  Commercial Facilities  Dams  Energy  Information Technology  Postal and Shipping 6 Photo courtesy of FEMA/Andrea Booher

Critical Infrastructure and Key Resources (continued)  Banking and Finance  Communications  Defense Industrial Base  Government Facilities  National Monuments and Icons  Transportation Systems 7

Critical Infrastructure and Key Resources (continued)  Chemical  Critical Manufacturing  Emergency Services  Healthcare and Public Health  Nuclear Reactors, Materials, and Waste  Water 8 Photo courtesy of NRC

Recognize, Avoid, Isolate, and Notify Concept  Recognize the hazard/threat  Avoid the hazard/contamination to prevent injury use the principles of time, distance and shielding.  Isolate the hazard area  Notify the appropriate support 9 Photo courtesy of FEMA/Michael Rieger

Questions for Presentation Preparation  How will you explain the importance of learning this module to your participants?  What do participants need to learn from this module content?  What additional resources can be used to reinforce learning the content in this module?  How will you involve the audience in learning this material?  What safety concerns need to be reinforced in this module? 10

Conclusion  What is terrorism? What is WMD?  What actions could indicate a potential terrorist activity?  How would you describe a suspicious object?  What are CIKR sectors and why would terrorists target them?  What do the four elements of the recognize, avoid, isolate, notify concept require the awareness level responder to do?  What are some potential instructional strategies you could use for facilitating the “Prevention and Deterrence” module? 11

Standardized Awareness Authorized Training, Train-the-Trainer Prevention and Deterrence—End of Module