emergency response vulnerability assessment planning response... · emergency response plans •...

60
Kim Dyches Emergency Response & Vulnerability Assessment Planning

Upload: doandan

Post on 05-Apr-2018

218 views

Category:

Documents


1 download

TRANSCRIPT

Kim Dyches

Emergency Response&

Vulnerability Assessment

Planning

Emergency Response Plans

• Actions during an event or disaster

• Lists responsibility of individuals

• Sets a command structure• Updated annually• Prepared by local officials• Lists critical customers

Essential Elements

• Essential plan elements• Objectives• Communications• Activation Procedures• Resource Mobilization• Response Protocols

• Management System• Action checklists

• Recovery plan and actions• Keep short & concise

The Plan must be in Writing

Communications

• System & Administrative Personnel• Work, Home, Cell, Pager, Other• List areas of expertise for best utilization

• Local Public Health Agency• State Drinking Water Agency

Daytime And After Hours Numbers

Communications

• Emergency Contacts• Police, Fire, Ambulance, Hospitals,

contractors, vendors, etc.

• Labs & testing capabilities• Radio & Television Contacts

• To warn and advise public• To inform system of current developments• To manage public information process

Daytime And After Hours Numbers

Activation Procedure

• Use a management system• Incident Command System (ICS)

• Identify chain of command• Begin documentation immediately

• Expenses, Equipment, Supplies• Labor costs, Losses

• Damage Assessment• Prioritize response activities• Prepare for on-going shifts

• Develop support functions• Food, Shelter, Logistics

• Manage the media

Available Resources

• Technical assistance-electronic, electrical, computer, pumps, etc.

• Contractors-excavation, welders, plumbing, electrical, etc.

• Repair supplies• In inventory now?• Parts suppliers?• Large-scale repairs

• Rental Equipment• Special needs

Power Sources• Primary Sources- Power Company• Have quick connects ready for

generators• Auxiliary Sources- Diesel, Natural

Gas, & Gasoline Powered Generators.

Outside Resources

• Mutual Aid• Intergovernmental Agreements

(IGA’s)• In place prior to the event

• Other water utilities• Other local governments• Everyone you’ll need help from!

• Memorandums of Understanding (MOU’s) • Again, before the event

• Private sector• Equipment and supplies• Labor

• Volunteer Plan• How to use them

Activation Procedure• System Communication

• Two-way radios • Cell phones • Text Message uses lower band. Works better• Have a back up system!!!

• Local emergency communication teams• Amateur radio operators, Volunteers, etc.

• Procedures for contacting support services after hours

• Press Releases & Media Contacts• Plan press releases in advance of event• Develop contacts & relationships with local media• Train your people; Designate spokesperson• May be frequent depending on the event

• 24/7 function; Be prepared to last through your event

Communications Inventory

• Telephones• Cell Phones• Two-way Radio• Computer Control

Systems (SCADA)

Damage Assessment

• Determine Extent Of Damage• Response needs to be adequate

• Determine Strategy• Establish priority sequence

• What’s most important• Confer with DDW and LHD• Risk Managers a good resource• Building Officials & Inspectors• State or Provincial Office of Emergency Preparedness

Response Strategies

• Develop any specialized response strategies for dealing with the different potential events you anticipate

• Contact other utilities that have experienced similar problems• What did they learn in the process?• What would they do different next time?• How does that apply to you?

Inform Community

• Phone coverage throughout the event…Customers will call you!

• List homes in the community that house elderly, kidney patients, AIDS victims, day care, etc.

• Public Notification; Door to door• Scouts, volunteers, etc.

• Reverse 911• Use community warning system siren,

bullhorn, etc. • Work with police and fire

Responders & Their Families

• Take care of your people!• Set up staging areas around

the water system for responders to report to

• Have plan to locate your responders & families that are missing

• Have plan to shelter & feedresponders & their families

• Maintain communication with responders’ families during event

Protecting Operators• Proper Training• Face and Breathing Protection• Proper Protective Clothing• Sanitation measures• Decontamination Awareness• Medical Treatment

Procedures• Blood-borne pathogen

universal precautions• Shut down ventilation

systems

Threatening Phone Calls

• Information to get from the caller

• Do not discuss the call with any other persons except investigators

• Name and time• What type of device• Where is it• What does it look like• Exact words of caller• Was caller male, female,

child, etc.• Description of voice• Background noises• Name/location of person

taking call• Immediate Supervisor

Complaint Phone Calls

• Possible 1st indicator • Information from customer

• If they complain of getting sick from the water, they should seek medical attention

• Name, address, phone, date, time

• Nature of problem (taste, smell, look)

• Duration of problem• Are neighbors having same

problem• Was water system notified• Did they respond• Sample in clean glass• Responder • Follow-up

Minimizing the Risks• During routine emergencies don’t

neglect security patrols• Diversion tactics

• Security checks at non-routine times during day

• Coordinate security with local police or other law enforcement

• Emergency response plans in place and current

• Identify contingency procedures (back-ups)

• Test Emergency Response Plans through table-top exercises

Minimizing the Risks

• Set up emergency meeting place

• Have good communications system

• Assign specific tasks (don’t assume)

• Prevention- Have a good Equipment Maintenance Program

Support Groups• Public Health Agencies• Hospitals• Public Works• Neighboring Water Utilities• Law enforcement agencies,

Utilities, Local, State, & Federal Agencies

• Local Emergency Planning Committees

Types of Exercises

•Orientation•Tabletop•Drill•Functional•Full-scale

Tabletop Exercise

• Informal Discussion of Simulated Emergency

• No Time Pressures• Low Stress• Useful for Evaluation of

Plans & Procedures• Useful for Resolving

Questions of Coordination & Responsibility

Keep in Mind• An exercise should be kept realistic• Use scenarios that would apply in a real event• Each responder may have a different approach

• This is why you have the exercise• It’s okay to use multiple events such as interagency

dependencies that create a domino affect, but keep them realistic

• Use expertise within the organization to design the exercise and define their roles

• Should test different parts of the plan.

Learn from Others’ Misfortunes

• Create an exercise from a real event

• Change response tactics • Review lessons learned

from actual events and practice them

• Contact agencies that may have responded to a similar event

Anthrax Lessons Learned

• Exposure through the mail is higher than they had assumed

• Number of spores that can cause illness or death is far fewer than previously understood

• Need to use more caution when responding because of higher risk

Tokyo Scenario• Happened during morning rush

hour• Even as the affected

passengers were exiting contaminated cars, new passengers were elbowing their way on to the train

• Within an hour, calls for help were flooding the Command Center

Tokyo Response to Event• Hundreds were affected, bleeding

from the mouth, unconscious or in convulsive fits

• First Aid stations next to ventilation shafts, exposing responders and victims

• Newspapers to mop up Sarin• Operators became victims affecting

others with exposed clothing• Trains were allowed to depart &

continued to run despite knowledge that an unknown chemical incident was going on

Tokyo Lessons Learned

• Better protective gear• Policies for when equipment is

worn• Procedures for

decontamination• Gas detection equipment• Bleaching powders & sprayers

on trains• Better inspections of trains• SCBA’s now on hand

Vulnerability Assessments

SECURITY

Vulnerability Assessments

• Systematic process to evaluate susceptibility

• VA’s & ERP’s viewed only by need to know personnel

• Determines types of assailants, threats, & probability

Threat Evaluation- Side by Side Activities • Threat Evaluation

• Based on the credibility of the threat & evaluation, this will determine your response

• Start with the most vulnerable components & areas of concern

• Response Decisions• Public Notification• Samples • System Isolation if possible• Flushing the System• Disinfection• Mobilize Inspection Teams• Notify other authorities:

Police, Fire, etc.• Contact the Media

Is it POSSIBLE?

Is it CREDIBLE?

CONFIRMATORY

YES

YES

Take precautionary

measures

Take precautionary

measures

NO

NO

Know your Enemy

• Survey surroundings and build a response around them

• Define critical components of your system & build a response around them

• The better you know your system, the more likely you can protect it

“Know your enemy and know yourself and you can fight a hundred battles without disaster.”

Sun Tzu from the Art of War

Information Seekers

• Screen calls- be careful what information you give over the phone

• Terrorists gain information before they strike

• Freedom of information • Specific information about a

water system should be given out by the water system not the State Agency

• Be mindful that your response may be monitored by the perps

List Critical Components

• Source Types• Treatment Plants• Storage• Power• Distribution System• Offices• Communications

Source Water

•Ground Water•Surface Water•Purchased Water

Treatment Plant Inventory

• Buildings• Pumps• Equipment- Basins,

Clearwell, Filters, etc. • Process Controls• Treatment Chemicals and

Storage• Lab Chemicals and Storage

Water Storage Information

• Storage Tanks- Buried, Elevated, Above Ground

• Pressure Tanks- Hydro Pneumatic

Distribution System Inventory• Pumps• Pipes• Valves• Appurtenances- Flush

Hydrants, Backflow Assemblies, Meters, Regulators, etc.

• Other Vulnerable Points

Offices Inventory

• Buildings• Computers• Files• Transportation- Work

Vehicles

Computer Protocols

• Password protected and changed every 90 days

• At least 8 characters, one number, one symbol *&%#, upper & lower case letters

• Firewall protection• Virus software that allows

continuous upgrades• Cyber attack is an example of

a technological threat• Be mindful of someone

looking over your shoulder

Fencing Critical Infrastructure• All critical facilities should

have perimeter security fencing

• Should be inspected frequently

• Secured with chains & tamper proof locks

• Concrete Jersey barriers should be considered to guard against accidental or intentional vehicle intrusion

Locks & Restraints• Secure doors, hatch lids,

windows, vents, gates, & ports of entry

• No unauthorized access• Reinforced hinges located on

the inside of facility• Window bars/mesh installed

on inside (per local fire codes)• Intrusion alarms on access

entryways.

Exterior Lighting

• Good deterrent • Intruders can be seen

and detected• Motion Sensors• Perimeter Lighting

Warning Signs

• Facility Protected by Federal Law

• Unauthorized Access Prohibited

• Employees Only• Authorized Personnel

Only

Inspect Area & Remove Objects

• Large Rocks• Pieces of Wood• Ladders• Pallets• Valve Keys• Cement Blocks• Other objects that could

be used as tools to gain entry

Clear Areas

• Tall vegetation• Overhanging trees• Landscaping that can

hide intruders• Trim trees and shrubs• Unobstructed view of

critical facilities

Alarm Systems

• Alarm system that notifies authorities and system personnel of intrusion

• Should be considered for buildings, tanks, pump houses, & treatment facilities.

Key Control• Interlocking locks• Contractors keys• Control key access to critical

components of system• Accountability for those

having access• Do not duplicate engraved on

keys• Change pass codes and

retrieve keys when employees are terminated from employment

Neighborhood Involvement

• Raise awareness around facilities with flyers, bill stuffers, or personal interaction

• Notify neighborhood watch programs

• Disposable cameras• Give call down list to

neighbors of who to call

Minimizing the Risks

• Flyers to customers advising of security

• Increased monitoring (chemicals & bacteriological samples)

• Have a kit with various sample test bottles ready

Water Source Protection

• Make sure wellhead is properly sealed

• Screen vent lines• Seal floor cracks• Cap abandoned wells• Fence and patrol surface water

areas

Chemical Deliveries• Increase operator awareness• Increase driver awareness• Strict credentialing of drivers• Communication between

plants and chemical providers• Fax copies of bill of lading and

credentials of drivers delivering chemicals

• Use of seals on chemical containers

Distribution System

• Control use of fire hydrants and valves

• Monitor system for constant positive pressure

• Implement backflow prevention program

System Isolation

• Can tanks be isolated from system?

• Install by pass piping to allow for tank isolation

• Install sample taps on reservoir piping

Personnel

• Criminal background checks• Verify employment per Immigration &

Naturalization Service Form 1-9• Issue photo I.D. cards• Inform of policy to render keys upon

termination• Uniforms/vehicles identified with logo• Advise personnel of vulnerability

concerns & reporting suspicious activity

• Have check list of who to call if threats are received

In-House Security• Background checks • Address security when hiring• Make security part of

performance plan• Employees need to follow

security measures:• Use of pass keys• Key control• Visitor Check-in• Authorized person w/visitors• Package delivery

Sensitive Information• Remove sensitive

information from Web• Are maps, records and

sensitive information in a secure location and labeled “Confidential”?

• Secure vehicles: maps, sensitive information, tools, keys, etc. could be stolen and should not be left in vehicle

My Information•Kim Dyches•195 North 1950 West•Salt Lake City, Utah 84114-4830•[email protected]•801-536-4202•801-560-8456 emergency cell