Top Banner
Kim Dyches Emergency Response & Vulnerability Assessment Planning
60

Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Apr 05, 2018

Download

Documents

doandan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Kim Dyches

Emergency Response&

Vulnerability Assessment

Planning

Page 2: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Emergency Response Plans

• Actions during an event or disaster

• Lists responsibility of individuals

• Sets a command structure• Updated annually• Prepared by local officials• Lists critical customers

Page 3: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Essential Elements

• Essential plan elements• Objectives• Communications• Activation Procedures• Resource Mobilization• Response Protocols

• Management System• Action checklists

• Recovery plan and actions• Keep short & concise

The Plan must be in Writing

Page 4: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Communications

• System & Administrative Personnel• Work, Home, Cell, Pager, Other• List areas of expertise for best utilization

• Local Public Health Agency• State Drinking Water Agency

Daytime And After Hours Numbers

Page 5: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Communications

• Emergency Contacts• Police, Fire, Ambulance, Hospitals,

contractors, vendors, etc.

• Labs & testing capabilities• Radio & Television Contacts

• To warn and advise public• To inform system of current developments• To manage public information process

Daytime And After Hours Numbers

Page 6: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Activation Procedure

• Use a management system• Incident Command System (ICS)

• Identify chain of command• Begin documentation immediately

• Expenses, Equipment, Supplies• Labor costs, Losses

• Damage Assessment• Prioritize response activities• Prepare for on-going shifts

• Develop support functions• Food, Shelter, Logistics

• Manage the media

Page 7: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Available Resources

• Technical assistance-electronic, electrical, computer, pumps, etc.

• Contractors-excavation, welders, plumbing, electrical, etc.

• Repair supplies• In inventory now?• Parts suppliers?• Large-scale repairs

• Rental Equipment• Special needs

Page 8: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Power Sources• Primary Sources- Power Company• Have quick connects ready for

generators• Auxiliary Sources- Diesel, Natural

Gas, & Gasoline Powered Generators.

Page 9: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Outside Resources

• Mutual Aid• Intergovernmental Agreements

(IGA’s)• In place prior to the event

• Other water utilities• Other local governments• Everyone you’ll need help from!

• Memorandums of Understanding (MOU’s) • Again, before the event

• Private sector• Equipment and supplies• Labor

• Volunteer Plan• How to use them

Page 10: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Activation Procedure• System Communication

• Two-way radios • Cell phones • Text Message uses lower band. Works better• Have a back up system!!!

• Local emergency communication teams• Amateur radio operators, Volunteers, etc.

• Procedures for contacting support services after hours

• Press Releases & Media Contacts• Plan press releases in advance of event• Develop contacts & relationships with local media• Train your people; Designate spokesperson• May be frequent depending on the event

• 24/7 function; Be prepared to last through your event

Page 11: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Communications Inventory

• Telephones• Cell Phones• Two-way Radio• Computer Control

Systems (SCADA)

Page 12: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Damage Assessment

• Determine Extent Of Damage• Response needs to be adequate

• Determine Strategy• Establish priority sequence

• What’s most important• Confer with DDW and LHD• Risk Managers a good resource• Building Officials & Inspectors• State or Provincial Office of Emergency Preparedness

Page 13: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Response Strategies

• Develop any specialized response strategies for dealing with the different potential events you anticipate

• Contact other utilities that have experienced similar problems• What did they learn in the process?• What would they do different next time?• How does that apply to you?

Page 14: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Inform Community

• Phone coverage throughout the event…Customers will call you!

• List homes in the community that house elderly, kidney patients, AIDS victims, day care, etc.

• Public Notification; Door to door• Scouts, volunteers, etc.

• Reverse 911• Use community warning system siren,

bullhorn, etc. • Work with police and fire

Page 15: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Responders & Their Families

• Take care of your people!• Set up staging areas around

the water system for responders to report to

• Have plan to locate your responders & families that are missing

• Have plan to shelter & feedresponders & their families

• Maintain communication with responders’ families during event

Page 16: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Protecting Operators• Proper Training• Face and Breathing Protection• Proper Protective Clothing• Sanitation measures• Decontamination Awareness• Medical Treatment

Procedures• Blood-borne pathogen

universal precautions• Shut down ventilation

systems

Page 17: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Threatening Phone Calls

• Information to get from the caller

• Do not discuss the call with any other persons except investigators

• Name and time• What type of device• Where is it• What does it look like• Exact words of caller• Was caller male, female,

child, etc.• Description of voice• Background noises• Name/location of person

taking call• Immediate Supervisor

Page 18: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Complaint Phone Calls

• Possible 1st indicator • Information from customer

• If they complain of getting sick from the water, they should seek medical attention

• Name, address, phone, date, time

• Nature of problem (taste, smell, look)

• Duration of problem• Are neighbors having same

problem• Was water system notified• Did they respond• Sample in clean glass• Responder • Follow-up

Page 19: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Minimizing the Risks• During routine emergencies don’t

neglect security patrols• Diversion tactics

• Security checks at non-routine times during day

• Coordinate security with local police or other law enforcement

• Emergency response plans in place and current

• Identify contingency procedures (back-ups)

• Test Emergency Response Plans through table-top exercises

Page 20: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Minimizing the Risks

• Set up emergency meeting place

• Have good communications system

• Assign specific tasks (don’t assume)

• Prevention- Have a good Equipment Maintenance Program

Page 21: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Support Groups• Public Health Agencies• Hospitals• Public Works• Neighboring Water Utilities• Law enforcement agencies,

Utilities, Local, State, & Federal Agencies

• Local Emergency Planning Committees

Page 22: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Types of Exercises

•Orientation•Tabletop•Drill•Functional•Full-scale

Page 23: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Tabletop Exercise

• Informal Discussion of Simulated Emergency

• No Time Pressures• Low Stress• Useful for Evaluation of

Plans & Procedures• Useful for Resolving

Questions of Coordination & Responsibility

Page 24: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Keep in Mind• An exercise should be kept realistic• Use scenarios that would apply in a real event• Each responder may have a different approach

• This is why you have the exercise• It’s okay to use multiple events such as interagency

dependencies that create a domino affect, but keep them realistic

• Use expertise within the organization to design the exercise and define their roles

• Should test different parts of the plan.

Page 25: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Learn from Others’ Misfortunes

• Create an exercise from a real event

• Change response tactics • Review lessons learned

from actual events and practice them

• Contact agencies that may have responded to a similar event

Page 26: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Anthrax Lessons Learned

• Exposure through the mail is higher than they had assumed

• Number of spores that can cause illness or death is far fewer than previously understood

• Need to use more caution when responding because of higher risk

Page 27: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Tokyo Scenario• Happened during morning rush

hour• Even as the affected

passengers were exiting contaminated cars, new passengers were elbowing their way on to the train

• Within an hour, calls for help were flooding the Command Center

Page 28: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Tokyo Response to Event• Hundreds were affected, bleeding

from the mouth, unconscious or in convulsive fits

• First Aid stations next to ventilation shafts, exposing responders and victims

• Newspapers to mop up Sarin• Operators became victims affecting

others with exposed clothing• Trains were allowed to depart &

continued to run despite knowledge that an unknown chemical incident was going on

Page 29: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Tokyo Lessons Learned

• Better protective gear• Policies for when equipment is

worn• Procedures for

decontamination• Gas detection equipment• Bleaching powders & sprayers

on trains• Better inspections of trains• SCBA’s now on hand

Page 30: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Vulnerability Assessments

SECURITY

Page 31: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Vulnerability Assessments

• Systematic process to evaluate susceptibility

• VA’s & ERP’s viewed only by need to know personnel

• Determines types of assailants, threats, & probability

Page 32: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Threat Evaluation- Side by Side Activities • Threat Evaluation

• Based on the credibility of the threat & evaluation, this will determine your response

• Start with the most vulnerable components & areas of concern

• Response Decisions• Public Notification• Samples • System Isolation if possible• Flushing the System• Disinfection• Mobilize Inspection Teams• Notify other authorities:

Police, Fire, etc.• Contact the Media

Page 33: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Is it POSSIBLE?

Is it CREDIBLE?

CONFIRMATORY

YES

YES

Take precautionary

measures

Take precautionary

measures

NO

NO

Page 34: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Know your Enemy

• Survey surroundings and build a response around them

• Define critical components of your system & build a response around them

• The better you know your system, the more likely you can protect it

“Know your enemy and know yourself and you can fight a hundred battles without disaster.”

Sun Tzu from the Art of War

Page 35: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Information Seekers

• Screen calls- be careful what information you give over the phone

• Terrorists gain information before they strike

• Freedom of information • Specific information about a

water system should be given out by the water system not the State Agency

• Be mindful that your response may be monitored by the perps

Page 36: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

List Critical Components

• Source Types• Treatment Plants• Storage• Power• Distribution System• Offices• Communications

Page 37: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Source Water

•Ground Water•Surface Water•Purchased Water

Page 38: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Treatment Plant Inventory

• Buildings• Pumps• Equipment- Basins,

Clearwell, Filters, etc. • Process Controls• Treatment Chemicals and

Storage• Lab Chemicals and Storage

Page 39: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Water Storage Information

• Storage Tanks- Buried, Elevated, Above Ground

• Pressure Tanks- Hydro Pneumatic

Page 40: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Distribution System Inventory• Pumps• Pipes• Valves• Appurtenances- Flush

Hydrants, Backflow Assemblies, Meters, Regulators, etc.

• Other Vulnerable Points

Page 41: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Offices Inventory

• Buildings• Computers• Files• Transportation- Work

Vehicles

Page 42: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Computer Protocols

• Password protected and changed every 90 days

• At least 8 characters, one number, one symbol *&%#, upper & lower case letters

• Firewall protection• Virus software that allows

continuous upgrades• Cyber attack is an example of

a technological threat• Be mindful of someone

looking over your shoulder

Page 43: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Fencing Critical Infrastructure• All critical facilities should

have perimeter security fencing

• Should be inspected frequently

• Secured with chains & tamper proof locks

• Concrete Jersey barriers should be considered to guard against accidental or intentional vehicle intrusion

Page 44: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Locks & Restraints• Secure doors, hatch lids,

windows, vents, gates, & ports of entry

• No unauthorized access• Reinforced hinges located on

the inside of facility• Window bars/mesh installed

on inside (per local fire codes)• Intrusion alarms on access

entryways.

Page 45: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Exterior Lighting

• Good deterrent • Intruders can be seen

and detected• Motion Sensors• Perimeter Lighting

Page 46: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Warning Signs

• Facility Protected by Federal Law

• Unauthorized Access Prohibited

• Employees Only• Authorized Personnel

Only

Page 47: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Inspect Area & Remove Objects

• Large Rocks• Pieces of Wood• Ladders• Pallets• Valve Keys• Cement Blocks• Other objects that could

be used as tools to gain entry

Page 48: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Clear Areas

• Tall vegetation• Overhanging trees• Landscaping that can

hide intruders• Trim trees and shrubs• Unobstructed view of

critical facilities

Page 49: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Alarm Systems

• Alarm system that notifies authorities and system personnel of intrusion

• Should be considered for buildings, tanks, pump houses, & treatment facilities.

Page 50: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Key Control• Interlocking locks• Contractors keys• Control key access to critical

components of system• Accountability for those

having access• Do not duplicate engraved on

keys• Change pass codes and

retrieve keys when employees are terminated from employment

Page 51: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Neighborhood Involvement

• Raise awareness around facilities with flyers, bill stuffers, or personal interaction

• Notify neighborhood watch programs

• Disposable cameras• Give call down list to

neighbors of who to call

Page 52: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Minimizing the Risks

• Flyers to customers advising of security

• Increased monitoring (chemicals & bacteriological samples)

• Have a kit with various sample test bottles ready

Page 53: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Water Source Protection

• Make sure wellhead is properly sealed

• Screen vent lines• Seal floor cracks• Cap abandoned wells• Fence and patrol surface water

areas

Page 54: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Chemical Deliveries• Increase operator awareness• Increase driver awareness• Strict credentialing of drivers• Communication between

plants and chemical providers• Fax copies of bill of lading and

credentials of drivers delivering chemicals

• Use of seals on chemical containers

Page 55: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Distribution System

• Control use of fire hydrants and valves

• Monitor system for constant positive pressure

• Implement backflow prevention program

Page 56: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

System Isolation

• Can tanks be isolated from system?

• Install by pass piping to allow for tank isolation

• Install sample taps on reservoir piping

Page 57: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Personnel

• Criminal background checks• Verify employment per Immigration &

Naturalization Service Form 1-9• Issue photo I.D. cards• Inform of policy to render keys upon

termination• Uniforms/vehicles identified with logo• Advise personnel of vulnerability

concerns & reporting suspicious activity

• Have check list of who to call if threats are received

Page 58: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

In-House Security• Background checks • Address security when hiring• Make security part of

performance plan• Employees need to follow

security measures:• Use of pass keys• Key control• Visitor Check-in• Authorized person w/visitors• Package delivery

Page 59: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

Sensitive Information• Remove sensitive

information from Web• Are maps, records and

sensitive information in a secure location and labeled “Confidential”?

• Secure vehicles: maps, sensitive information, tools, keys, etc. could be stolen and should not be left in vehicle

Page 60: Emergency Response Vulnerability Assessment Planning response... · Emergency Response Plans • Actions during an event or ... •Do not duplicate engraved on keys ... •Issue photo

My Information•Kim Dyches•195 North 1950 West•Salt Lake City, Utah 84114-4830•[email protected]•801-536-4202•801-560-8456 emergency cell