emergency response vulnerability assessment planning response... · emergency response plans •...
TRANSCRIPT
Emergency Response Plans
• Actions during an event or disaster
• Lists responsibility of individuals
• Sets a command structure• Updated annually• Prepared by local officials• Lists critical customers
Essential Elements
• Essential plan elements• Objectives• Communications• Activation Procedures• Resource Mobilization• Response Protocols
• Management System• Action checklists
• Recovery plan and actions• Keep short & concise
The Plan must be in Writing
Communications
• System & Administrative Personnel• Work, Home, Cell, Pager, Other• List areas of expertise for best utilization
• Local Public Health Agency• State Drinking Water Agency
Daytime And After Hours Numbers
Communications
• Emergency Contacts• Police, Fire, Ambulance, Hospitals,
contractors, vendors, etc.
• Labs & testing capabilities• Radio & Television Contacts
• To warn and advise public• To inform system of current developments• To manage public information process
Daytime And After Hours Numbers
Activation Procedure
• Use a management system• Incident Command System (ICS)
• Identify chain of command• Begin documentation immediately
• Expenses, Equipment, Supplies• Labor costs, Losses
• Damage Assessment• Prioritize response activities• Prepare for on-going shifts
• Develop support functions• Food, Shelter, Logistics
• Manage the media
Available Resources
• Technical assistance-electronic, electrical, computer, pumps, etc.
• Contractors-excavation, welders, plumbing, electrical, etc.
• Repair supplies• In inventory now?• Parts suppliers?• Large-scale repairs
• Rental Equipment• Special needs
Power Sources• Primary Sources- Power Company• Have quick connects ready for
generators• Auxiliary Sources- Diesel, Natural
Gas, & Gasoline Powered Generators.
Outside Resources
• Mutual Aid• Intergovernmental Agreements
(IGA’s)• In place prior to the event
• Other water utilities• Other local governments• Everyone you’ll need help from!
• Memorandums of Understanding (MOU’s) • Again, before the event
• Private sector• Equipment and supplies• Labor
• Volunteer Plan• How to use them
Activation Procedure• System Communication
• Two-way radios • Cell phones • Text Message uses lower band. Works better• Have a back up system!!!
• Local emergency communication teams• Amateur radio operators, Volunteers, etc.
• Procedures for contacting support services after hours
• Press Releases & Media Contacts• Plan press releases in advance of event• Develop contacts & relationships with local media• Train your people; Designate spokesperson• May be frequent depending on the event
• 24/7 function; Be prepared to last through your event
Damage Assessment
• Determine Extent Of Damage• Response needs to be adequate
• Determine Strategy• Establish priority sequence
• What’s most important• Confer with DDW and LHD• Risk Managers a good resource• Building Officials & Inspectors• State or Provincial Office of Emergency Preparedness
Response Strategies
• Develop any specialized response strategies for dealing with the different potential events you anticipate
• Contact other utilities that have experienced similar problems• What did they learn in the process?• What would they do different next time?• How does that apply to you?
Inform Community
• Phone coverage throughout the event…Customers will call you!
• List homes in the community that house elderly, kidney patients, AIDS victims, day care, etc.
• Public Notification; Door to door• Scouts, volunteers, etc.
• Reverse 911• Use community warning system siren,
bullhorn, etc. • Work with police and fire
Responders & Their Families
• Take care of your people!• Set up staging areas around
the water system for responders to report to
• Have plan to locate your responders & families that are missing
• Have plan to shelter & feedresponders & their families
• Maintain communication with responders’ families during event
Protecting Operators• Proper Training• Face and Breathing Protection• Proper Protective Clothing• Sanitation measures• Decontamination Awareness• Medical Treatment
Procedures• Blood-borne pathogen
universal precautions• Shut down ventilation
systems
Threatening Phone Calls
• Information to get from the caller
• Do not discuss the call with any other persons except investigators
• Name and time• What type of device• Where is it• What does it look like• Exact words of caller• Was caller male, female,
child, etc.• Description of voice• Background noises• Name/location of person
taking call• Immediate Supervisor
Complaint Phone Calls
• Possible 1st indicator • Information from customer
• If they complain of getting sick from the water, they should seek medical attention
• Name, address, phone, date, time
• Nature of problem (taste, smell, look)
• Duration of problem• Are neighbors having same
problem• Was water system notified• Did they respond• Sample in clean glass• Responder • Follow-up
Minimizing the Risks• During routine emergencies don’t
neglect security patrols• Diversion tactics
• Security checks at non-routine times during day
• Coordinate security with local police or other law enforcement
• Emergency response plans in place and current
• Identify contingency procedures (back-ups)
• Test Emergency Response Plans through table-top exercises
Minimizing the Risks
• Set up emergency meeting place
• Have good communications system
• Assign specific tasks (don’t assume)
• Prevention- Have a good Equipment Maintenance Program
Support Groups• Public Health Agencies• Hospitals• Public Works• Neighboring Water Utilities• Law enforcement agencies,
Utilities, Local, State, & Federal Agencies
• Local Emergency Planning Committees
Tabletop Exercise
• Informal Discussion of Simulated Emergency
• No Time Pressures• Low Stress• Useful for Evaluation of
Plans & Procedures• Useful for Resolving
Questions of Coordination & Responsibility
Keep in Mind• An exercise should be kept realistic• Use scenarios that would apply in a real event• Each responder may have a different approach
• This is why you have the exercise• It’s okay to use multiple events such as interagency
dependencies that create a domino affect, but keep them realistic
• Use expertise within the organization to design the exercise and define their roles
• Should test different parts of the plan.
Learn from Others’ Misfortunes
• Create an exercise from a real event
• Change response tactics • Review lessons learned
from actual events and practice them
• Contact agencies that may have responded to a similar event
Anthrax Lessons Learned
• Exposure through the mail is higher than they had assumed
• Number of spores that can cause illness or death is far fewer than previously understood
• Need to use more caution when responding because of higher risk
Tokyo Scenario• Happened during morning rush
hour• Even as the affected
passengers were exiting contaminated cars, new passengers were elbowing their way on to the train
• Within an hour, calls for help were flooding the Command Center
Tokyo Response to Event• Hundreds were affected, bleeding
from the mouth, unconscious or in convulsive fits
• First Aid stations next to ventilation shafts, exposing responders and victims
• Newspapers to mop up Sarin• Operators became victims affecting
others with exposed clothing• Trains were allowed to depart &
continued to run despite knowledge that an unknown chemical incident was going on
Tokyo Lessons Learned
• Better protective gear• Policies for when equipment is
worn• Procedures for
decontamination• Gas detection equipment• Bleaching powders & sprayers
on trains• Better inspections of trains• SCBA’s now on hand
Vulnerability Assessments
• Systematic process to evaluate susceptibility
• VA’s & ERP’s viewed only by need to know personnel
• Determines types of assailants, threats, & probability
Threat Evaluation- Side by Side Activities • Threat Evaluation
• Based on the credibility of the threat & evaluation, this will determine your response
• Start with the most vulnerable components & areas of concern
• Response Decisions• Public Notification• Samples • System Isolation if possible• Flushing the System• Disinfection• Mobilize Inspection Teams• Notify other authorities:
Police, Fire, etc.• Contact the Media
Is it POSSIBLE?
Is it CREDIBLE?
CONFIRMATORY
YES
YES
Take precautionary
measures
Take precautionary
measures
NO
NO
Know your Enemy
• Survey surroundings and build a response around them
• Define critical components of your system & build a response around them
• The better you know your system, the more likely you can protect it
“Know your enemy and know yourself and you can fight a hundred battles without disaster.”
Sun Tzu from the Art of War
Information Seekers
• Screen calls- be careful what information you give over the phone
• Terrorists gain information before they strike
• Freedom of information • Specific information about a
water system should be given out by the water system not the State Agency
• Be mindful that your response may be monitored by the perps
List Critical Components
• Source Types• Treatment Plants• Storage• Power• Distribution System• Offices• Communications
Treatment Plant Inventory
• Buildings• Pumps• Equipment- Basins,
Clearwell, Filters, etc. • Process Controls• Treatment Chemicals and
Storage• Lab Chemicals and Storage
Water Storage Information
• Storage Tanks- Buried, Elevated, Above Ground
• Pressure Tanks- Hydro Pneumatic
Distribution System Inventory• Pumps• Pipes• Valves• Appurtenances- Flush
Hydrants, Backflow Assemblies, Meters, Regulators, etc.
• Other Vulnerable Points
Computer Protocols
• Password protected and changed every 90 days
• At least 8 characters, one number, one symbol *&%#, upper & lower case letters
• Firewall protection• Virus software that allows
continuous upgrades• Cyber attack is an example of
a technological threat• Be mindful of someone
looking over your shoulder
Fencing Critical Infrastructure• All critical facilities should
have perimeter security fencing
• Should be inspected frequently
• Secured with chains & tamper proof locks
• Concrete Jersey barriers should be considered to guard against accidental or intentional vehicle intrusion
Locks & Restraints• Secure doors, hatch lids,
windows, vents, gates, & ports of entry
• No unauthorized access• Reinforced hinges located on
the inside of facility• Window bars/mesh installed
on inside (per local fire codes)• Intrusion alarms on access
entryways.
Exterior Lighting
• Good deterrent • Intruders can be seen
and detected• Motion Sensors• Perimeter Lighting
Warning Signs
• Facility Protected by Federal Law
• Unauthorized Access Prohibited
• Employees Only• Authorized Personnel
Only
Inspect Area & Remove Objects
• Large Rocks• Pieces of Wood• Ladders• Pallets• Valve Keys• Cement Blocks• Other objects that could
be used as tools to gain entry
Clear Areas
• Tall vegetation• Overhanging trees• Landscaping that can
hide intruders• Trim trees and shrubs• Unobstructed view of
critical facilities
Alarm Systems
• Alarm system that notifies authorities and system personnel of intrusion
• Should be considered for buildings, tanks, pump houses, & treatment facilities.
Key Control• Interlocking locks• Contractors keys• Control key access to critical
components of system• Accountability for those
having access• Do not duplicate engraved on
keys• Change pass codes and
retrieve keys when employees are terminated from employment
Neighborhood Involvement
• Raise awareness around facilities with flyers, bill stuffers, or personal interaction
• Notify neighborhood watch programs
• Disposable cameras• Give call down list to
neighbors of who to call
Minimizing the Risks
• Flyers to customers advising of security
• Increased monitoring (chemicals & bacteriological samples)
• Have a kit with various sample test bottles ready
Water Source Protection
• Make sure wellhead is properly sealed
• Screen vent lines• Seal floor cracks• Cap abandoned wells• Fence and patrol surface water
areas
Chemical Deliveries• Increase operator awareness• Increase driver awareness• Strict credentialing of drivers• Communication between
plants and chemical providers• Fax copies of bill of lading and
credentials of drivers delivering chemicals
• Use of seals on chemical containers
Distribution System
• Control use of fire hydrants and valves
• Monitor system for constant positive pressure
• Implement backflow prevention program
System Isolation
• Can tanks be isolated from system?
• Install by pass piping to allow for tank isolation
• Install sample taps on reservoir piping
Personnel
• Criminal background checks• Verify employment per Immigration &
Naturalization Service Form 1-9• Issue photo I.D. cards• Inform of policy to render keys upon
termination• Uniforms/vehicles identified with logo• Advise personnel of vulnerability
concerns & reporting suspicious activity
• Have check list of who to call if threats are received
In-House Security• Background checks • Address security when hiring• Make security part of
performance plan• Employees need to follow
security measures:• Use of pass keys• Key control• Visitor Check-in• Authorized person w/visitors• Package delivery
Sensitive Information• Remove sensitive
information from Web• Are maps, records and
sensitive information in a secure location and labeled “Confidential”?
• Secure vehicles: maps, sensitive information, tools, keys, etc. could be stolen and should not be left in vehicle
My Information•Kim Dyches•195 North 1950 West•Salt Lake City, Utah 84114-4830•[email protected]•801-536-4202•801-560-8456 emergency cell