1 / 44

ALL HAZARD APPROACH Raising the Overall Level of Preparedness

ALL HAZARD APPROACH Raising the Overall Level of Preparedness. WMD. Level of Preparedness. Hurricane. Fire. Mass Casualty. Infrastructure. Frequency of Type of Incident. Homeland Security Presidential Directive-5 Management of Domestic Incidents.

chogan
Download Presentation

ALL HAZARD APPROACH Raising the Overall Level of Preparedness

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ALL HAZARD APPROACHRaising the Overall Level of Preparedness WMD Level of Preparedness Hurricane Fire Mass Casualty Infrastructure Frequency of Type of Incident UCI Company Proprietary

  2. Homeland Security Presidential Directive-5Management of Domestic Incidents “To prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other emergencies, the United States Government shall establish a single, comprehensive approach to domestic incident management. The objective of the United States Government is to ensure that all levels of government across the Nation have the capability to work efficiently and effectively together, using a national approach to domestic incident management. In these efforts, with regard to domestic incidents, the United States Government treats crisis management and consequence management as a single, integrated function, rather than as two separate functions. “ UCI Company Proprietary

  3. Homeland Security Presidential Directive-5Management of Domestic Incidents “The Secretary shall develop, submit for review to the Homeland Security Council, and administer a National Incident Management System (NIMS). This system will provide a consistent nationwide approach for Federal, State, and local governments to work effectively and efficiently together to prepare for, respond to, and recover from domestic incidents, regardless of cause, size, or complexity. To provide for interoperability and compatibility among Federal, State, and local capabilities, the NIMS will include a core set of concepts, principles, terminology, and technologies covering the incident command system; multi-agency coordination systems; unified command; training; identification and management of resources (including systems for classifying types of resources); qualifications and certification; and the collection, tracking, and reporting of incident information and incident resources.” UCI Company Proprietary

  4. What is IMS? • Boilerplate - rules of the game • A toolbox - “Use what you need!” • Common terms • Bottom up decision making • Effective resource allocation UCI Company Proprietary

  5. Who Does IMS Apply To?FIRST RESPONDERS • Typically considered Fire, Police, Paramedic, Emergency Medicine, Public Health • New concepts include convergent response • Generally consists of first organized response UCI Company Proprietary

  6. Actions of civilian responders • Stumble into the mayhem • Hopefully recognize the problem • Apply limited resources • Scream for help • Locals act as “speed bumps.” (J. Denney, LAFD) UCI Company Proprietary

  7. Convergent Players • Utility companies • Postal and express delivery services • Meter readers and inspectors • Transit – Buses and taxis • Public works crews • Private security and volunteer watch groups • Real estate agents UCI Company Proprietary

  8. Incident Management Systems • Urban Fire IMS • Wildland Fire IMS • Emer. Medical IMS • Law Enforcement IMS • Public Works IMS • Hospital Emer. IMS • National Interagency Incident Mgmt. Sys. UCI Company Proprietary

  9. Basic principles • Function driven • Span of control< 5 • Inter-agency model • Effective resource allocation • Information sharing & group decision making UCI Company Proprietary

  10. The CNN factor The big dog will eat; you can feed him, or he’ll go through your garbage! “Embedded Reporter” UCI Company Proprietary

  11. IMS/DoD Integration • Unified command – both parties share the sandbox • DoD integration at the section level (operations, logistics, planning) • DoD units team with strike teams, task forces, or units (ex: CBIRF with Haz Mat) • Any combinations of the above UCI Company Proprietary

  12. Presidential Strategy • HLS – build and oversee national system for incident management • State/local adoption requirement for Federal funding • Essential Requirements: • Standard incident management system • Interagency planning • Wireless communication interoperability • Local threat assessment and notification UCI Company Proprietary

  13. The Big Four Revisited 1.) Joint operations – IMS/C3I integration; national ICS all-hazard overhead teams 2.) Common Operational Picture – Coordination with Northern Command; Access 250 3.) Planning and sustainability – DoD planning model integrated into IMS; national cache system with national contracting model 4.) Training – Required integrated/coordinated with common exercise objectives UCI Company Proprietary

  14. Information Operations (IO) • Most agencies are clueless! • What does the community have to know? • Our infrastructure is a “house of cards.” • Websites are “wide open” • We need standards, guidance, and training. UCI Company Proprietary

  15. WTC Communications • Very complex incident • Command destroyed • Mass officer fatalities • Confused situational awareness • Com incompatibility in every U.S. region UCI Company Proprietary

  16. D.C. Police Experience on Sept. 11 • OPM closed federal offices but never notified Metro (D.C.) Police • Metro Police got alerts from CNN • Local officials were out of position and could not move due to traffic • All comm was overloaded or failed • The 50 year old EBS system was never used UCI Company Proprietary

  17. UCI Company Proprietary

  18. UCI Company Proprietary

  19. The New Threat Warning System • National level threat advisory system • Warnings are not threat and location specific UCI Company Proprietary

  20. Threat Warning System • Purpose • To standardize knowledge and response to various threat levels • To allow various communities and organizations to have a “common operational picture” of the situation • Replaces ad-hoc alert levels and status UCI Company Proprietary

  21. Threat Warning System • Low Condition (green) • Low Risk of Attack • Actions include • General training and review of plans • Maintenance of response capability • Practice Institutional Response Procedures UCI Company Proprietary

  22. Threat Warning System • Guarded Condition (Blue) • Possibility of generalized terrorist attack • No specific threat • No specific target • Actions include • Check communications with emergency resources • Review and update emergency procedures • Provide public with information to assist in their preparedness UCI Company Proprietary

  23. Threat Warning System • Elevated Condition (Yellow) • Significant risk of terrorist attack • No specific targets but possible specified threat • Actions include • Increase surveillance of critical locations • Coordinate emergency plans as appropriate with nearby jurisdictions • Assess whether specific threat requires modification of plans • Implement, as appropriate, contingency and emergency operations plans UCI Company Proprietary

  24. Threat Warning System • High Condition (Orange) • High risk of terrorist attacks • Specific Threats • Specific Targets • Actions include • Coordinate necessary security efforts at all levels of government • Take additional precautions at high vulnerability, high risk venues • Prepare to execute contingency emergency procedures • Restrict access, as needed, to threatened facilities UCI Company Proprietary

  25. Threat Warning System • Severe Condition (Red) • Severe Risk of Terrorist Attack • Credible, specific evidence • High reliability of data • Corroboration of information • Actions include • Increasing staff and personnel to emergency levels • Assigning and deploying emergency response personnel and deploying teams and equipment • Monitoring, redirecting or constraining transportation • Closing public and government facilities UCI Company Proprietary

  26. After The Anthrax Scares • The FBI said, “Quit calling us.” • The fire guys said, “Quit calling us.” • The Police picked up the slack. • No training • No protocols • No equipment UCI Company Proprietary

  27. COMMUNICATIONTHREAT TYPES • HAZMAT • Blast/Burn • Mass Casualty • Infrastructure Almost all incidents are combinations of two or more of the above UCI Company Proprietary

  28. COMMUNICATIONPRIORITIES • LIFE • PROPERTY • ATTRIBUTION UCI Company Proprietary

  29. COMMUNICATIONOTHER ISSUES • Classification and security • Incompatible radios and commo gear • Differences in methodology and CONOPS • Who’s in charge and does what? UCI Company Proprietary

  30. Anthrax LessonsDecision Making without Data • Need to make decisions rapidly in the absence of data • Access to subject matter experts was limited • No “textbook” experience to guide response • Understanding of “risk” evolved as outbreak unfolded • Need coherent, rapid process for addressing scientific issues in midst of crisis UCI Company Proprietary

  31. Northern Command • New command since September 11 • Responsible for the CONUS • Assets loaned from other DoD commands • Integrates with local responders UCI Company Proprietary

  32. Integration – Coordinating with Other Agencies • Multiple emergency operations centers (EOC) • When do you set up a local EOC? • Beware of multiple command posts! • Mobile communications units are not always compatible UCI Company Proprietary

  33. National Caches • Regional • Centralized ordering and Control System • Incorporates push and pull logistics strategy • Applicable for counter terrorism and other response caches UCI Company Proprietary

  34. Pharmaceutical Supplies • Presently based on JIT (just-in-time) inventory practices • Most hospitals and EMS services have only a two day supply • DHHS/DHS presently working on national pharmaceutical cache system UCI Company Proprietary

  35. Quote of the Briefing “Any sufficiently advanced technology is indistinguishable from magic.” Arthur C. Clark UCI Company Proprietary

  36. RESPONSESTECHNOLOGY • NO R&D dollars in civilian first response community • Must leverage existing resources • Difference between system and technology • Recognize difference in missions and requirements • Electronic Warfare • Reliability • Needs MUST drive technology, not other way around UCI Company Proprietary

  37. HLS C2 ACTD Vision To define, refine and transition technologies and concepts of operations that significantly increase DoD Homeland Security responsiveness in consequence management, crisis response, deterrence and intelligence coordination. UCI Company Proprietary

  38. Recommended Focus • Crisis response… Request for assistance – Strategic, Operational, and Tactical • Consequence management… Request for support -Strategic, Operational, and Tactical • Training… Embedded self- training simulation package • Common Relevant Operational Picture development • Land, Maritime, Air, MACA domains • Web-based • Geo-spatially referenced • Multi-level security • Automated Response Data Processing • Assured redundant conductivity, voice, data, collaboration • Voice to text • Text to voice UCI Company Proprietary

  39. Problem Statement • Communications interrupted • DoD insight was very limited • Limited Intelligence sharing • Slow Command, Control, and Coordination between DoD and Civil authorities UCI Company Proprietary

  40. Lessons Learned • Interoperability • Continued work is needed to provide data and application integration for time-sensitive situational awareness, command, control, and coordination • Situational Awareness • Better methods to extract and disseminate sensor data for visualization and alerting • Improve and automate the responder’s ability to recognize and navigate available IT services • Assured Connectivity • Quicker, easier configuration of communications equipment • Rapid deployment of wideband communications • Information Assurance and Security • Improve protection of critical command, control and coordination links between all civil and federal responders From April 2002, Crisis Response Demonstration UCI Company Proprietary

  41. HLS TECHNOLOGY • Communications • Assurance • Reliable • Bandwidth enhancement • QoS • Interoperability • Network tools • Privacy • Security • Visualization tools • Collaboration tools • Planning and management applications • Modeling tools • Reporting tools UCI Company Proprietary

  42. Summary • Threats are NOT magic! • Neither is the technology to combat them! • The user is the final say and expert, not the marketer or technology developer • No technology is a solution unto itself; they all require doctrine: The two together must be assessed and are a SYSTEM! • Consider the mission as a system, not in isolation • Use minimum technology necessary to get job done- we are not here to play with toys! • Technology must be driven by needs, never drive them UCI Company Proprietary

  43. MOST IMPORTANT! • NO TECHNOLOGY IS A PANACEA! • NOTHING replaces well trained and capable personnel • Every technology must have a doctrine for use along with it, otherwise it is useless, and can cost lives • Doctrine/need must drive technology, not be driven by it UCI Company Proprietary

  44. NOTHING REPLACES WELL TRAINED, COMPETENT AND MOTIVATED PROFESSIONALS! NOTHING! PEOPLE ARE THE MOST IMPORTANT ASSET UCI Company Proprietary

More Related