Handbook of Anesthesia
Handbook of Anesthesia
Handbook of Anesthesia
Management Concepts
A Step-by-Step Approach
http://taylorandfrancis.com
Handbook of Emergency
Management Concepts
A Step-by-Step Approach
Michael L. Madigan
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize
to copyright holders if permission to publish in this form has not been obtained. If any copyright material
has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans-
mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright
.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the
CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
vii
viii Contents
Program Development............................................................... 36
Program Implementation........................................................... 37
Escalating Crisis Communication.................................................. 37
Risk Communication...................................................................... 37
Summary........................................................................................ 37
Key Terms...................................................................................... 38
Principal Hazards in the United States............................................... 38
Environmental Hazards.................................................................. 38
Meteorological Hazards................................................................. 38
Wildfires......................................................................................... 38
Floods............................................................................................. 39
Storm Surge.................................................................................... 39
Geophysical Hazards...................................................................... 39
Technological Hazards................................................................... 39
Toxic Chemicals.............................................................................40
Biological Hazards.........................................................................40
Summary........................................................................................ 41
Key Terms...................................................................................... 41
Hazard and Disaster Classification..................................................... 41
Major Categories............................................................................ 41
Earth Hazardous to Your Health.................................................... 41
Still Hazardous............................................................................... 42
Categories of Natural Hazards....................................................... 42
Atmospheric-Sourced Processes.................................................... 42
Geological-Sourced Processes....................................................... 42
Hydrological-Sourced Processes.................................................... 42
Extraterrestrial Processes............................................................... 43
Biological Processes....................................................................... 43
Anthropogenic Nonintentional....................................................... 43
Technological.................................................................................. 43
Nuclear............................................................................................ 43
Transportation................................................................................ 43
Structural........................................................................................44
Anthropogenic Intentional Hazards...............................................44
Mass Shootings...............................................................................44
Civil Disobedience.........................................................................44
Terrorism........................................................................................44
WMD CBRNE (Chemical, Biological, Radiological,
Nuclear, and High-Yield Explosives)..............................................44
Hazard, Vulnerability, and Risk Analysis...........................................44
Community Vulnerability..............................................................44
Preimpact Conditions..................................................................... 45
Event-Specific Conditions.............................................................. 45
Social Impacts................................................................................ 45
Interventions................................................................................... 45
x Contents
India’s Recovery............................................................................. 70
Land-Use in Colombia.................................................................... 71
Seveso Directives........................................................................... 71
Chi-Chi Earthquake....................................................................... 71
Summary........................................................................................ 72
Professional Accountability................................................................ 72
Distinguishing Emergency Management....................................... 72
Defining “Profession”..................................................................... 72
Emergency Management as a Profession....................................... 73
Development and Ethics................................................................. 73
Body of Knowledge........................................................................ 73
Emergency Management Certification........................................... 73
Academic Programs....................................................................... 74
Legal Liability................................................................................ 74
Summary........................................................................................ 75
Key Terms...................................................................................... 75
Future Directions in Emergency Management................................... 75
Global Challenges.......................................................................... 75
Opportunities.................................................................................. 76
National Challenges........................................................................ 76
Terrorist Threats............................................................................. 76
National Challenges........................................................................ 77
Professional Challenges.................................................................. 77
Professional Opportunities............................................................. 77
Summary........................................................................................ 77
Home Security................................................................................84
Computer Security..........................................................................84
Security Management in Organizations......................................... 85
3D Security..................................................................................... 85
Security and Classified Information............................................... 85
Government Classification.................................................................. 86
Typical Classification Levels.......................................................... 86
Top Secret.................................................................................. 86
Secret......................................................................................... 87
Confidential............................................................................... 87
Restricted................................................................................... 87
Official....................................................................................... 87
Unclassified................................................................................ 87
Clearance................................................................................... 87
Compartmented Information............................................................... 87
International................................................................................... 88
NATO Classifications..................................................................... 88
United States................................................................................... 88
Classified Information in the United States............................... 88
Corporate Classification................................................................. 89
Traffic Light Protocol..................................................................... 89
Risk..................................................................................................... 89
Definitions......................................................................................90
Areas............................................................................................... 91
Risk Assessment and Analysis.................................................. 91
Quantitative Analysis..................................................................... 91
Security Increase................................................................................. 91
Surveillance....................................................................................92
A “Nest” of Surveillance Cameras............................................92
Countersurveillance, Inverse Surveillance, Sousveillance........ 93
Crisis Leadership............................................................................ 98
Sudden Crisis............................................................................. 98
Smoldering Crisis........................................................................... 98
Signal Detection..................................................................................99
Containment and Damage Control......................................................99
Business Recovery...............................................................................99
Learning............................................................................................ 100
Crisis Communication....................................................................... 100
Models and Theories Associated with Crisis Management.............. 100
Crisis Management Strategy........................................................ 100
Crisis Management Model............................................................ 100
Crisis Management Planning....................................................... 101
Contingency Planning.................................................................. 101
Business Continuity Planning...................................................... 101
Structural-Functional Systems Theory........................................ 102
Diffusion of Innovation Theory................................................... 102
Role of Apologies in Crisis Management.......................................... 102
Crisis Leadership............................................................................... 103
Unequal Human Capital Theory....................................................... 103
Social Media and Crisis Management.............................................. 103
Implementation.................................................................................. 122
Review and Evaluation of the Plan............................................... 123
Limitations................................................................................... 123
Hazard Analysis........................................................................... 123
Hazards and Risk.......................................................................... 124
Severity Definitions—Safety Related............................................... 124
Likelihood of Occurrence................................................................. 125
Tactics................................................................................................ 166
Responses.......................................................................................... 167
Databases........................................................................................... 167
War on Terror.................................................................................... 168
U.S. Objectives............................................................................. 168
Chapter 15 Emergency and the National Incident Management System (NIMS).... 235
Introduction....................................................................................... 235
Summary...........................................................................................240
Considerable Preparation Needed..................................................... 242
Certified Emergency Manager.......................................................... 243
Maintaining Certification.............................................................244
Benefits of Certifications..............................................................244
xxiii
http://taylorandfrancis.com
Author
Michael L. Madigan works as a master instructor for the
Department of Homeland Security for the Civil Support
Teams and Hazardous material emergency response
operations on weapons of mass destruction (WMD),
installation emergency management, and threat assess-
ments to the United States Army Chemical, Biological,
Radiological and Nuclear School (USACBRN) on Fort
Leonard Wood in Missouri. He is also retired from the
United States Army and served as a senior chemical
operation specialist to the USACBRN School, Central Command (CENTCOM), and
the Multi-National Forces Command (MNFI) in Iraq.
Mr. Madigan is married to his wife Michelle and has 7 children and 14 grandchil-
dren. He loves to travel.
He earned a BA degree in Criminal Justice from the University of Massachusetts
and a Master of Security Management from the American Military University from
Charles Town. In addition, he holds the Certificate in Security Management from
the University of Massachusetts, and is currently working on his doctoral degree in
Emergency Management (DEM) from Capella University. Mr. Madigan is also a cer-
tified fire instructor Level II, hazardous material technician train the trainer, incident
command system train the trainer, installation emergency management instructor,
WMD/terrorism response instructor, certified Incident Command System/National
Incident Management System (ICS/NIMS) instructor, and advanced chemical bio-
logical instructor.
Over his 40-plus-year career, he has distinguished himself by exceptionally meri-
torious service in a succession of positions of great importance and responsibility to
the Army and the Nation.
His previous positions directly influence the Operations for the J3 MNFI
CBRNE, United States Forces Iraq, and Iraqi Army WMD/Terrorism/CBRNE Non-
Commissioned Officer in Charge (NCOIC) Team Chief, and Survey team chief of a
civil support team.
As the WMD/Terrorism and CBRNE Team Chief, he has positively and directly
influenced the Army and the Department of Defense Policies and program. He has
made recommendations to the MNFI Commander, and has communicated advice
and recommendations to reflect the depth and breadth with considerable experience
and affected future programs and policy that will carry the Army through the end of
the sustained combat operations and into an Army focused on building the capacity
of the partners of the United States dealing with CBRNE and hazardous materials
research, training, and response.
Mr. Madigan is also an adjunct professor for homeland security-related topics,
emergency management, mass casualty/mass fatality, terror/terrorism history, related
operations, and WMD at Central Texas College on Fort Leonard Wood Campus,
Missouri.
xxv
http://taylorandfrancis.com
Introduction
There are many ways to describe emergency management and the importance of the
tasks that emergency managers perform. Indeed, in some respects, it hardly seems
necessary to explain the need for a profession whose purpose is saving lives and
property in disasters. It is likely that, while many people recognize that their com-
munities are exposed to environmental threats requiring a systematic program of
protection, only a few appreciate the magnitude and diversity of the threats. One can
introduce the study of emergency management by noting that losses from disasters—
in the United States and the rest of the world—have been growing over the years and
are likely to continue to grow.
The world is plagued by an increasing number and variety of types of disasters,
an impression that is certainly heightened by what seem to be frequent, very-large-
scale natural disasters—including earthquakes, floods, hurricanes, volcanic erup-
tions, and wildfires—all over the globe. When we add to these events a wide range
of severe storms, mudslides, lightning strikes, tornadoes, and other hazard agents
affecting smaller numbers of people, one might conclude that natural disasters are
increasing.
Technological activities also initiate disasters. Hazardous materials are trans-
ported via road, rail, water, and air. When containment is breached, casualties,
property loss, and environmental damage can all occur. Some technologies, such
as nuclear power plants, pose seemingly exotic risks, whereas more commonplace
technological processes such as metal plating operations use chemical agents that
are very dangerous. Even the queen of American technology, the space program, has
experienced disaster associated with system failures. Finally, we see terrorists oper-
ating on U.S. soil—made forever visible by the attacks on the World Trade Center
on September 11, 2001.
With increasing population density and changing land use patterns, more people
are exposed to natural hazards, and consequently, our accumulated human and eco-
nomic losses are increasing. Much of this exposure is a matter of choice. Sometimes,
people choose hazardous places, building houses on picturesque cliffs, on mountain
slopes, in floodplains, near beautiful volcanoes, or along seismic faults. Sometimes,
people choose hazardous building materials that fail under extreme environmen-
tal stresses—for example, unreinforced masonry construction in seismically active
areas. Some exposure results from constrained choices; the cheap land or low rent in
flood plains often attracts the poor.
Given the increasing toll from disasters arising from natural hazards, techno-
logical accidents, and terrorist attacks using technological agents, American society
must decide whether the risks are “acceptable.” Moreover, given the limited amount
of time and resources that can be devoted to risk management, decisions must be
made about which risks to address.
When individuals, organizations, or political jurisdictions reach consensus that
a given risk is unacceptable, resources can be marshaled to reduce the risk to some
level deemed more acceptable. Such resources can be used to attempt to eliminate
xxvii
xxviii Introduction
the source of the danger or, alternatively, change the way people relate to the source
of danger.
In general terms, emergency management is “the discipline and profession of
applying science, technology, planning and management to deal with extreme events
that can injure or kill large numbers of people, do extensive damage to property, and
disrupt community life” (Questions on the emergence of a discipline/field of study
training). Thus, emergency managers identify, anticipate, and respond to the risks
of catastrophic events in order to reduce to more acceptable levels the probability of
their occurrence or the magnitude and duration of their social impacts.
1 Emergency Management
1
2 Handbook of Emergency Management Concepts
have a plan prepared to mitigate the effects of that emergency, as well as to ensure
business continuity of critical operations postincident. It is essential for an organi-
zation to include procedures for determining whether an emergency situation has
occurred and at what point an emergency management plan should be activated.
IMPLEMENTATION IDEALS
An emergency plan must be regularly maintained, in a structured and methodical
manner, to ensure that it is up-to-date in the event of an emergency. Emergency
managers generally follow a common process to anticipate, assess, prevent, prepare,
respond, and recover from an incident.
Prevention
Prevention was recently added to the phases of emergency management. It focuses
on preventing the human hazard, primarily from potential natural disasters or ter-
rorist attacks. Preventive measures are taken on both the domestic and international
levels, designed to provide permanent protection from disasters. Not all disasters,
particularly natural disasters, can be prevented, but the risk of loss of life and injury
can be mitigated with good evacuation plans, environmental planning, and design
Emergency Management 3
standards. In January 2005, a total of 167 governments adopted a 10-year global plan
for natural disaster risk reduction called the Hyogo Framework (Hyogo Framework
for Action (HFA), UNISDR, www.unisdr.org/we/coordinate/hfa).
Preventing or reducing the impacts of disasters on our communities is a key focus
for emergency management efforts today. Prevention and mitigation also help reduce
the financial costs of disaster response and recovery. Public Safety Canada is work-
ing with provincial and territorial governments and stakeholders to promote disaster
prevention and mitigation using a risk-based and all-hazards approach. In 2008, federal/
provincial/territorial ministers endorsed a National Disaster Mitigation Strategy
(Emergency Management—Public Safety Canada, https://www.publicsafety.gc.ca
/cnt/mrgnc-mngmnt/index-en.aspx).
Mitigation
Preventive or mitigation measures take different forms for different types of disas-
ters. In earthquake-prone areas, these preventive measures might include structural
changes such as the installation of an earthquake valve to instantly shut off the
natural gas supply, seismic retrofits of property, and the securing of items inside a
building. The latter may include the mounting of furniture, refrigerators, water heat-
ers, and breakables to the walls and the addition of cabinet latches. In flood-prone
areas, houses can be built on poles/stilts. In areas prone to prolonged electricity
black-outs, installation of a generator ensures continuation of electrical service. The
construction of storm cellars and fallout shelters are further examples of personal
mitigation actions.
Disaster mitigation measures are those that eliminate or reduce the impacts and
risks of hazards through proactive measures taken before an emergency or disaster
occurs.
Preparedness
Preparedness focuses on preparing equipment and procedures for use when a disas-
ter occurs. This equipment and these procedures can be used to reduce vulnerability
to disaster, to mitigate the impacts of a disaster or to respond more efficiently in an
emergency. The FEMA has set out a basic four-stage vision of preparedness flowing
from mitigation to preparedness to response to recovery and back to mitigation in
a circular planning process. This circular, overlapping model has been modified by
other agencies, taught in emergency class, and discussed in academic papers.
FEMA also operates a Building Science Branch that develops and produces multi
hazard mitigation guidance that focuses on creating disaster-resilient communities to
reduce loss of life and property. FEMA advises citizens to prepare their homes with
some emergency essentials in the case that the food distribution lines are interrupted.
FEMA has subsequently prepared for this contingency by purchasing hundreds of
thousands of freeze-dried food emergency meals ready to eat to dispense to the com-
munities where emergency shelter and evacuations are implemented.
Emergency preparedness can be difficult to measure. The Centers for Disease
Control and Prevention (CDC) (https://www.cdc.gov) focuses on evaluating the
effectiveness of its public health efforts through a variety of measurement and
assessment programs.
4 Handbook of Emergency Management Concepts
Preparedness Measures
Preparedness measures can take many forms, ranging from focusing on individual
people, locations, or incidents to broader, government-based “all-hazard” planning.
There are a number of preparedness stages between all-hazard and individual plan-
ning, generally involving some combination of both mitigation and response plan-
ning. Business continuity planning encourages businesses to have a disaster recovery
plan. Community- and faith-based organizations’ mitigation efforts promote field
response teams and interagency planning.
Family preparedness for disaster is fairly unusual. A 2013 survey found that only
19% of American families felt that they were “very prepared” for a disaster. Still, there
are many resources available for family disaster planning (“Disaster Management
with Case Study,” SlideShare Families, https://www.slideshare.net/.../disaster-mana
gement-with-case-study). The Department of Homeland Security’s* page includes
a Family Emergency Plan Checklist; has a whole webpage devoted to readiness for
kids, complete with cartoon-style superheroes; and ran a Thunderclap Campaign in
2014. The CDC has a Zombie Apocalypse website (Zombie Preparedness, PHPR,
CDC, https://www.cdc.gov/phpr/zombie/index.htm).
* Ready.gov knows what disasters could affect your area, how to get emergency alerts, and where you
would go if you and your family need to evacuate. Check out the related links to learn what to do
before, during and after each type of emergency.
6 Handbook of Emergency Management Concepts
of threats exist. Nonetheless, there is basic guidance for preparedness that is com-
mon despite an area’s specific dangers. FEMA recommends that everyone have a
three-day survival kit for their household. Because individual household sizes and
specific needs might vary, FEMA’s recommendations are not item specific, but the
list includes the following:
Along similar lines, but not exactly the same, the CDC has its own list for a proper
disaster supply kit (https://www.cdc.gov).
• Children’s entertainment
• Crayons and coloring books
• Notebooks and writing supplies
• Nuts, bolts, screws, nails, etc.
• Religious material
• Sporting equipment, card games, and board games
• Food and water for at least 3 days for each pet; bowls, and a manual can
opener.
• Depending on the pet, you may need a litter box, paper towels, plastic trash
bags, grooming items, and/or household bleach.
• Medications and medical records stored in a waterproof container.
• First aid kit with a pet first aid book.
• Sturdy leash, harness, and carrier to transport pet safely. A carrier should
be large enough for the animal to stand comfortably, turn around, and lie
down. Your pet may have to stay in the carrier for several hours.
• Pet toys and the pet’s bed, if you can easily take it, to reduce stress.
• Current photos and descriptions of your pets to help others identify them in
case you and your pets become separated and to prove that they are yours.
• Information on feeding schedules, medical conditions, behavior problems,
and the name and telephone number of your veterinarian in case you have
to board your pets or place them in foster care.
Emergency preparedness also includes more than physical items and skill-specific
training. Psychological preparedness is also a type of emergency preparedness, and
specific mental health preparedness resources are offered for mental health profes-
sionals by organizations such as the Red Cross. These mental health preparedness
resources are designed to support both community members affected by a disaster
and the disaster workers serving them. CDC has a website (https://www.cdc.gov)
devoted to coping with a disaster or traumatic event.
After such an event, the CDC, through the SAMHSA, suggests that people seek
psychological help when they exhibit symptoms such as excessive worry, crying fre-
quently, an increase in irritability, anger, and frequent arguing, wanting to be alone
most of the time, feeling anxious or fearful, overwhelmed by sadness, confused,
having trouble thinking clearly and concentrating, and difficulty making decisions,
increased alcohol and/or substance use, increased physical (aches, pains) complaints
such as headaches, and trouble with “nerves.”
Sometimes, emergency supplies are kept in what is called a bug-out bag. While
FEMA does not actually use the term “bug-out bag,” calling it instead as some variation
Emergency Management 9
of a “go kit,” the idea of having emergency items in a quickly accessible place is
common to both FEMA and CDC, although online discussions of what items a bug-
out bag should include sometimes cover items such as firearms and great knives that
are not specifically suggested by FEMA or CDC (https://www.cdc.gov). The theory
behind a bug-out bag is that emergency preparations should include the possibility
of emergency evacuation. Whether fleeing a burning building or hastily packing a
car to escape an impending hurricane, flood, or dangerous chemical release, rapid
departure from a home or workplace environment is always a possibility, and FEMA
suggests having a family emergency plan for such occasions.
Because family members may not be together when disaster strikes, this plan
should include reliable contact information for friends or relatives who live outside
of what would be the disaster area for household members to notify they are safe or
otherwise communicate with each other. Along with the contact information, FEMA
suggests having well-understood local gathering points if a house must be evacuated
quickly to avoid the dangers of reentering a burning home. Family and emergency
contact information should be printed on cards and put in each family member’s
backpack or wallet. If family members spend a significant amount of time in a spe-
cific location, such as at work or school, FEMA suggests learning the emergency
preparation plans for those places.
FEMA has a specific form, in English and in Spanish, to help people put together
these emergency plans, although it lacks lines for e-mail contact information (Resources
for Other Languages, https://www.fema.gov/resources-other-languages).
Like children, people with disabilities and other special needs have special emer-
gency preparation needs. While “disability” has a specific meaning for specific orga-
nizations such as collecting Social Security benefits, for the purposes of emergency
preparedness, the Red Cross uses the term in a broader sense to include people with
physical, medical, sensor, or cognitive disabilities or the elderly and other special
needs populations. Depending on the particular disability, specific emergency prepa-
rations might be required.
FEMA’s suggestions for people with disabilities includes having copies of pre-
scriptions, charging devices for medical devices such as motorized wheel chairs,
and a week’s supply of medication readily available or in a “go stay kit.” In some
instances, lack of competency in English may lead to special preparation require-
ments and communication efforts for both individuals and responders.
FEMA notes that long-term power outages can cause damage beyond the original
disaster that can be mitigated with emergency generators or other power sources to
provide an emergency power system. The U.S. Department of Energy states that
“homeowners, business owners, and local leaders may have to take an active role in
dealing with energy disruptions on their own.” This active role may include install-
ing or procuring generators that are either portable or permanently mounted and run
on fuels such as propane or natural gas or gasoline.
Concerns about carbon monoxide poisoning, electrocution, flooding, fuel storage,
and fire leads even small property owners to consider professional installation and
maintenance. Major institutions like hospitals, military bases, and educational insti-
tutions often have or are considering extensive backup power systems. Instead of, or
in addition to, fuel-based power systems, solar, wind, and other alternative power
10 Handbook of Emergency Management Concepts
sources may be used. Standalone batteries, large or small, are also used to provide
backup charging for electrical systems and devices ranging from emergency lights
to computers to cell phones.
Emergency preparedness does not stop at home or at school. The U.S. Department
of Health and Human Services addresses specific emergency preparedness issues
that hospitals may have to respond to, including maintaining a safe temperature,
providing adequate electricity for life support systems, and even carrying out evacu-
ations under extreme circumstances (www.dmort7.org/downloads/2009SpringNational
News.pdf). FEMA encourages all businesses to have an emergency response plan,
and the Small Business Administration specifically advises small business owners to
also focus on emergency preparedness and provides a variety of different worksheets
and resources.
FEMA cautions that emergencies happen while people are travelling as well and
provides guidance around emergency preparedness for a range of travelers to include
commuters, commuter emergency plan, and holiday travelers. In particular, Ready.
gov has a number of emergency preparations specifically designed for people with
cars. These preparations include having a full gas tank, maintaining adequate wind-
shield wiper fluid, and other basic car maintenance tips. Items specific to an emer-
gency include the following:
property owners must ensure they have any special tools needed for their particular
gas hookups. Ready.gov also notes that “It is wise to teach all responsible household
members where and how to shut off the electricity,” cautioning that individual circuits
should be shut off before the main circuit. Ready.gov further states that “It is vital that
all household members learn how to shut off the water at the main house valve” and
cautions that the possibility that rusty valves might require replacement.
Response
The response phase of an emergency may commence with search and rescue, but
in all cases, the focus will quickly turn to fulfilling the basic humanitarian needs of
the affected population. This assistance may be provided by national or international
agencies and organizations. Effective coordination of disaster assistance is often cru-
cial, particularly when many organizations respond and local emergency manage-
ment agency capacity has been exceeded by the demand or diminished by the disaster
itself. The National Response Framework (NRF) is a U.S. government publication
that explains the responsibilities and expectations of government officials at the local,
state, federal, and tribal levels. It provides guidance on emergency support functions
that may be integrated in whole or parts to aid in the response and recovery process.
On a personal level, the response can take the shape either of a shelter in place or
an evacuation.
Evacuation Sign
In a shelter-in-place scenario, a family would be prepared to fend for themselves in
their home for many days without any form of outside support. In an evacuation, a
family leaves the area by automobile or other mode of transportation, taking with
them the maximum amount of supplies they can carry, possibly including a tent for
shelter. If mechanical transportation is not available, evacuation on foot would ide-
ally include carrying at least three days of supplies and rain-tight bedding, a tarpau-
lin, and a bedroll of blankets.
Donations are often sought during this period, especially for large disasters that
overwhelm local capacity. Due to efficiencies of scale, money is often the most
cost-effective donation if fraud is avoided. Money is also the most flexible, and if
goods are sourced locally, then transportation is minimized and the local economy
is boosted. Some donors prefer to send gifts in kind; however, these items can end
up creating issues, rather than helping. One innovation by Occupy Sandy volunteers
is to use a donation registry, where families and businesses impacted by the disaster
can make specific requests, which remote donors can purchase directly via a web-
site (“Occupy Sandy: A New Model for Disaster Relief,” TIDES, https://startidesnet
.wordpress.com/2014/07/09/occupy-sandy-a-new).
Medical considerations will vary greatly based on the type of disaster and sec-
ondary effects. Survivors may sustain a multitude of injuries to include lacerations,
burns, near drowning, or crush syndrome.
Recovery
The recovery phase starts after the immediate threat to human life has subsided. The
immediate goal of the recovery phase is to bring the affected area back to normalcy
12 Handbook of Emergency Management Concepts
AS A PROFESSION
Professional emergency managers can focus on government and community pre-
paredness or private business preparedness. Training is provided by local, state,
federal, and private organizations and ranges from public information and media
relations to high-level incident command and tactical skills.
In the past, the field of emergency management has been populated mostly by
people with a military or first-responder background. Currently, the field has become
more diverse, with many managers coming from a variety of backgrounds other
than the military or first responder fields. Educational opportunities are increasing
for those seeking undergraduate and graduate degrees in emergency management
or a related field. There are over 180 schools in the United States with emergency-
management-related programs, but only one doctoral program specifically in emer-
gency management.
Professional certifications such as Certified Emergency Manager (CEM) and
Certified Business Continuity Professional (CBCP) are becoming more common
as professional standards are raised throughout the field, particularly in the United
States. There are also professional organizations for emergency managers, such as
the National Emergency Management Association and the International Association
of Emergency Managers.
Principles
In 2007, Dr. Wayne Blanchard of FEMA’s Emergency Management Higher Educa
tion Project, under the direction of Dr. Cortez Lawrence, superintendent of FEMA’s
Emergency Management Institute, convened a working group of emergency manage-
ment practitioners and academics to consider principles of emergency management.
This was the first time the principles of the discipline were to be codified. The group
agreed on eight principles that will be used to guide the development of a doctrine of
emergency management. Below is a summary (mentioned also in Chapter 2):
1. Comprehensive—consider and take into account all hazards, all phases, all
stakeholders and all impacts relevant to disasters.
2. Progressive—anticipate future disasters and take preventive and prepara-
tory measures to build disaster-resistant and disaster-resilient communities.
Emergency Management 13
Tools
In recent years, the continuity feature of emergency management has resulted in a
new concept, Emergency Management Information Systems (EMIS). For continuity
and interoperability between emergency management stakeholders, EMIS supports
an infrastructure that integrates emergency plans at all levels of government and
nongovernment involvement for all four phases of emergencies. In the healthcare
field, hospitals utilize the Hospital Incident Command System (emsa.ca.gov, http://
www.emsa.ca.gov/media/default/HICS/HICS_Guidebook_2014_10.pdf; HICS is an
incident), which provides structure and organization in a clearly defined chain of
command.
Incident participation:
structured to meet the needs of this diverse audience with an emphasis on separate
organizations working together in all-hazards emergencies to save lives and pro-
tect property. Particular emphasis is placed on governing doctrine such as the NRF,
National Incident Management System, and the National Preparedness Guidelines.
EMI is fully accredited by the International Association for Continuing Education
and Training and the American Council on Education.
The Independent Study (IS) program at EMI consists of free courses offered to
U.S. citizens in Comprehensive Emergency Management techniques. Course IS-1
is entitled “Emergency Manager: An Orientation to the Position” and provides
background information on FEMA and the role of emergency managers in agency
and volunteer organization coordination. The EMI IS Program, a web-based dis-
tance learning program open to the public, delivered extensive online training with
approximately 200 courses and trained more than 2.8 million individuals. IS courses
are online and at no cost to anyone who has the proper login information and SSID
student number (e.g., 0000123456).
http://taylorandfrancis.com
2 Introduction to
Emergency Management:
Step by Step Process
PLANNING PROCESS
Definitions
• Hazard refers to the potential for extreme events to affect people, property
and the natural environment in a given location.
• Two descriptions of emergency are as follows:
• Minor events that cause a few casualties and a limited amount of prop-
erty damage.
• An imminent event that will likely strike soon.
• Disaster is reserved for events that produce more losses than a community
can handle.
Natural Disasters
• Large scale natural disasters are common (earthquakes, floods, hurricanes,
volcanic eruptions, and wild land fires).
• More people are being affected by natural disasters and losses are becom-
ing progressively greater.
• People are choosing hazardous building designs and inadequate structural
materials that fail under extreme stress.
Technological Disasters
• People are more affected now by technological disasters because there are
more people living close to them.
• Risks are rising from increased quantity and variety of hazardous materials.
• Use of nuclear power plants and liquefied natural gas facilities.
Terrorist Disasters
• Terrorists use some of the same materials involved in technological disas-
ters and are intended to cause many casualties and major damage.
17
18 Handbook of Emergency Management Concepts
Local Management
• Emergency management is a local job to influence events with local
consequences.
• The Federal Emergency Management Agency’s (FEMA’s) practice of
attempting to manage events locally whenever possible places a major bur-
den on state and local government agencies.
• The current National Response Plan states that local jurisdictions must
be able to operate without external help for 72 hours after hazard impact
(https://www.dhs.gov/xlibrary/assets/NRP_Brochure.pdf).
Planning Process
There are four steps in performing a hazard/vulnerability analysis:
• Identify hazards.
• Estimate the probability.
• Project the consequences.
• Communities need to develop hazard management strategies from four
basic elements: hazard mitigation, emergency preparedness, emergency
response, and disaster recovery.
Introduction to Emergency Management 19
Hazard Mitigation
• Hazard mitigation addresses the causes of a disaster, reducing the likeli-
hood it will occur or limiting its impact.
• Focus is to stop disasters before they happen.
• Changing either the natural event or human behavior, or both, reduces the
impact of a natural event such as a flood, hurricane, or earthquake.
• The choice of whether to reduce technological hazards by controlling the
hazard agent or by controlling the human use depends on political and eco-
nomic decisions.
Preparedness
• Preparedness consists of plans, procedures, and resources that must be
developed in advance.
• Designed to support a timely and effective emergency response to an immi-
nent impact and guide the disaster recovery process.
• Disaster program needs to answer four questions:
• Which agencies will participate?
• What response and recovery actions are feasible?
• How will the response and recovery organizations function and what
resources are needed?
• How will disaster preparedness be established and maintained?
Response
• Emergency response begins when the event occurs or when hazard-
monitoring systems alert authorities of an imminent disaster.
• Emergency response goals are as follows:
• Protecting the population.
• Limiting damage from the primary impact.
• Minimizing damage from secondary impacts.
• Secondary impacts are “disasters caused by the disaster” and include haz-
ardous materials releases initiated by earthquakes.
• Local emergency responders dominate the response period, which is char-
acterized by uncertainty and urgency.
Recovery
• Recovery begins as the disaster is ending and continues until the commu-
nity is back to normal.
• The immediate goal is to restore the community’s infrastructure.
• The ultimate goal is to return the community’s quality of life to the same
level as it was before the disaster.
• Most resources during recovery come from outside the community—
the majority of resources in a major disaster come from the federal
government.
20 Handbook of Emergency Management Concepts
Strategy Mix
• Historically, more emergency management resources are used for response
and recovery than for mitigation and preparedness.
• Recent events, such as Hurricane Katrina, have called attention to the flaw
in this policy.
• Community’s hazard management strategy should combine all four activities.
Summary
• This section demonstrated how you must prepare for threats through the
use of mitigation, preparedness, response, and recovery plans. The use of
technological systems, risk communication, and sanctions and incentives
enables the effective implementation of emergency plans.
Key Terms
• Disaster
• Emergency
• Hazard
• Mitigation
• Natural disaster
• Recovery
• Response
• Secondary impacts
• Terrorist disasters
• Technological disasters
The four pillars of emergency management are the phases of planning and action
undertaken to ensure a comprehensive approach to emergency management, while
maximizing the security of the infrastructure, continuity of operations, and the
safety of staff, public.
The four pillars are as follows (Figure 2.2).
Mitigation
• Mitigation is the most cost-efficient method for reducing the impact of
hazards.
• A precursor activity to mitigation is the identification of risks.
• Physical risk assessment refers to the process of identifying and evaluating
hazards.
• The higher the risk, the more urgent the need is to target hazard specific
vulnerabilities through mitigation efforts.
22 Handbook of Emergency Management Concepts
n
atio
itig
dm Op
an risk era
I
n e tio
uc na
io
I.
lr
d
nt
Pr ess co
e
Re
ve
ep
ad
re
in
SE
are rdinated
P*
I. P
M
M
P*
SE
dne
Environmental
o
Scan
ss
Leadership engagement
appro
All-hazards risk assessment
Training
ach
Exercise
Capability improvement
process Inc
Rest
Performance ide
nt
ored
*
IV. tinuity
P assessment
SE
M
SE
/co
M
R
P*
ec
n
ov
ce
s
ie dan
e
er
on co
r
sp
y
o
ac
fo
Re
s
er
. in iorit
p
at I
ion
s II spon ic pr
se
d re teg
te g rate h stra
In wit
Preparedness
• Preparedness is a continuous cycle of planning, organizing, training, equip-
ping, exercising, evaluation, and improvement activities that ensure effective
coordination and the enhancement of capabilities to prevent, protect against,
respond to, recover from, and mitigate against disaster events that have been
identified within the Hazard Vulnerability Analysis (HVA) (https://training
.fema.gov/emiweb/downloads/untservicelearning.pdf).
• In the preparedness phase, the Emergency Management Department devel-
ops plans of action to manage and counter risks and takes action to build the
necessary capabilities needed to implement such plans.
Introduction to Emergency Management 23
Response
• The response phase includes the mobilization of the identified emergency
staff, including first responders, to an internal or external event that could
have an impact on patient care operations.
• Response procedures are predetermined by the local government and are
detailed in disaster plans during the preparedness phase.
• Response to an internal or external event on the local government is directed
through the Incident Command System (ICS).
• Response plans remain flexible in nature due to the varying members of
staff available on the installation at any given time.
• Response procedures and plans are constantly evaluated and changed based
on improvements identified during After Action Reviews, which are held
after disaster events.
• Response is also evaluated regularly by the local government through drills,
exercises, tracers, and live events.
Recovery
• The aim of the recovery phase is to restore the affected area to its previous
state.
• It differs from the response phase in its focus: recovery efforts are con-
cerned with issues and decisions that must be made after immediate needs
are addressed.
• Recovery efforts are primarily concerned with actions that involve rebuild-
ing destroyed property, reemployment, the repair of other essential infra-
structure, as well as the reopening of essential services.
• Recovery operations are an extremely important phase in the emergency
management continuum and yet one that is often overlooked.
• The ICS team is responsible for the implementation of the recovery phase.
As a basis for its foundation, the Emergency Management Committee centers its
attention on six critical planning areas:
1. Communications
2. Resources and assets
3. Safety and security
4. Staff responsibility
5. Utilities
6. Support activities
• Post commander
• Installation commander
• Emergency manager
• Emergency management team
• Emergency operation center (EOC) personnel
• Provost marshal
• Fire department (on and off base)
• Emergency medical service (on and off base)
• Department of Public Works (on and off base)
• Information management and technology
26 Handbook of Emergency Management Concepts
These are just some areas to be considered during the development, planning,
writing, and maintain of the EOP.
The ICS is used by emergency responders across the nation as well as by our local
governments and agencies. The ICS is successful because it uses a common organi-
zational structure with standardized management principles.
• The structure being used in the hospital is similar to the structure being
used in the community by police, fire fighters, homeland security, and other
rescue personnel.
• With ICS in effect, the hospital and other organizations can communicate effec-
tively and efficiently to solve problems and get the emergency under control.
• In fact, the U.S. Department of Homeland Security requires all organiza-
tions that receive federal funds become National Incident Management
System (NIMS) compliant, which includes the incorporation of ICS (https://
www.fema.gov/national-incident-management-system).
Introduction to Emergency Management 27
BP Section 1
Regional oil spill response plan – Gulf of Mexico Quick guide
On-scene commander Situation unit leader Service branch director Support branch director Cost unit leader
The ICS has evolved over the years and has taken on a specific meaning for instal-
lation systems in the form of the installation ICS (IICS). While IICS provides a
prescriptive model for implementation, the installation can tailor the conventional
methodology of the ICS in most cases to fit their specific needs (Figure 2.3).
• The mission is to give the local government personnel the support system
they need to continue to provide continuity of operations across all post
functions, even in disaster situations.
• In order to offer this critical response, the department maintains an exten-
sive CEMP that addresses an all-hazards approach to disaster preparedness
and an emergency management team that continually reviews and improves
the program.
28 Handbook of Emergency Management Concepts
Review
Q: What are the four pillars of emergency management?
A: Mitigation, preparedness, response, recovery
Q: What type of thinking should the emergency planning team have?
A: “What if” thinking
Q: What is the name of the process that the all-hazards approach planning done by?
A: Hazard vulnerability analysis
Q: How often must the EOP be reviewed?
A: Annually
• Social groups
• Economic groups
• Political groups
Much of your skill in dealing with stakeholders will depend on power, how it plays
in your relationships with stakeholders and how it influences policies.
Social Groups
The basic social group unit is the household. Households
Economic Groups
• Small businesses are the most at risk, but are more likely to respond to
appeals for assistance.
• Businesses tend to focus on response and recovery.
• Disasters cause business interruption—a loss of revenue due to a disruption.
• A critical business stakeholder is public utilities.
Introduction to Emergency Management 29
Government Stakeholders
Governmental stakeholders include the town or city, the county, the state, and the
federal level.
The most important stakeholders are the state emergency management agencies
(SEMAs). They
• Set policies
• Provide the legal framework
• Link local governments with FEMA
At the national level, with the establishment of Health and Safety Authority, a restruc-
turing of emergency management began. FEMA’s role remains to be determined.
Involving Stakeholders
The local emergency manager must involve all relevant stakeholders in the process.
There are four simple ways to get the community involved in hazard prevention.
• Talk up your work to friends and neighbors. Creating buzz about emergency
management is an inexpensive and valuable way to get community support.
• Set up a hazard hotline. Advertise the hotline.
• Speak at schools, neighborhood, and community organizations. Discuss
potential threats and emergency management plans.
• Form citizen committees to help advise on the emergency management
plans and to get volunteers for carrying out the plans.
Power
Stakeholders have different levels of power.
Organizational theorists have described six bases of power:
• Reward
• Coercive
• Legitimate
• Expert
• Referent
• Information power
Power operates in the upward and downward directions. Power operates along a
chain between households and the federal government.
Policy Process
• The basic steps of the policy process are five stages through which policies
move.
• The emergency manager’s first task is to put hazards on the political agenda.
30 Handbook of Emergency Management Concepts
Agenda Setting
• Window of opportunity—The time immediately following a focusing event
during which local emergency managers are most likely to be able to influ-
ence policy.
• Because of the short amount of time to effect policy change, individual
actors must work aggressively to set issues on the agenda and to keep them
there.
• Three qualities are needed to be successful:
• Technical expertise in hazards, acquired either through education or
experience
• Political expertise necessary for any successful policy change effort
• Personal commitment because it can take years to overcome opposition
to new policies
Policy Formulation
• Managers should have a set of proposals before they attempt to shape the
agenda.
• A goal is to minimize court challenges and unintended consequences of the
policy or law.
• When developing any public policy, stakeholders must be included. This is
especially important for hazard policies, because these policies often require
• Certain present investment
• Certain opportunity cost
• Uncertain future benefit
Policy Adoption
• Policy adoption involves getting stakeholders to urge elected officials to
pass the policy.
• Adoption is not the end of the story. All policies must be implemented to
be effective.
• Three factors that affect policy implementation.
• How easy is it to solve the problem?
• Is there a clear link between the solution and the problem?
• What level of technology and amount of resources is available to solve
the problem?
• A policy should be evaluated periodically and either improved or terminated.
Introduction to Emergency Management 31
Summary
• This section examined the essential elements of an emergency management
policy. It also demonstrated how you can involve stakeholders in emergency
management planning and processes. It is important to recognize your own
power in influencing stakeholders and policies.
Key Terms
• Business interruption
• CERTs
• Economic groups
• Expert power
• Focusing event
• Governmental groups
• Information power
• Legitimate power
• Referent power
• Reward and coercive power
• Stakeholder
• Social groups
• Window of opportunity
Emergency Manager
• As the local emergency manager, you will report to the CAO during
emergencies.
• Your status depends on the following:
• Size of community
• Financial resources of the community
• Community’s vulnerability to hazards
• You will work mostly with the police, fire, EMS, and public works
departments.
• Usually, the CAO is not an expert in public safety, emergency medicine, or
emergency management.
32 Handbook of Emergency Management Concepts
Funding Sources
• Your most obvious source of funding is the CAO.
• FEMA has a range of programs that provide financial assistance.
• Continued financial support is based on meeting performance and financial
requirements.
• For some forms of FEMA funding, LEMAs submit applications through
their SEMAs.
• Industrial facilities, such as nuclear power plants, can help defray the costs
of preparing their facilities for an emergency.
Effective Organizations
• An effective LEMA focuses on
• Organizational outcomes
• Individual outcomes
• Planning process
• Frequent, recent, and severe impacts can lead to a disaster subculture in
which residents adopt routines to prepare for disasters.
• Community support from senior officials, news media, and public affects
the resources allocated to the LEMA.
• Effectiveness of LEMAs can be partly attributed to availability of resources.
LEMA Effectiveness
• Emergency management network effectiveness is greater in communities
with recent disaster experience. The more effective networks
• Have members with more experience
• Have a wider range of local contacts
• Have written plans and were familiar with them
• Have personal experience in managing routine natural hazards such as
floods
• Are more familiar with the policies and procedures of emergency-
relevant state and federal agencies
• Have representation by elected officials and by citizens’ groups
Introduction to Emergency Management 33
Planning Process
The planning process consists of five functions.
1. Plan activities: Cities with a better planning process adopt more prepared-
ness practices.
2. Provide a positive work climate: Planning effectiveness is highest in posi-
tive organizational climates.
3. Analyze the situation: Examine the five factors.
4. Acquire resources: Obtain staff, equipment, and information from a variety
of sources.
5. Choose a strategy: You can use multiple strategies, and the extent to which
you use each one will depend on the size of the community, available fund-
ing, and your own personal characteristics.
Outcomes
• For a LEMA to be effective, you need dedicated individuals. People are
committed to organizations that provide benefits:
• Personal (salary, benefits, or feeling of doing something positive for the
community)
• Social (having friends at work)
• Purposeful (work gives a purpose, an identity)
• Emergency management organizations are often judged based on
• Effectiveness of plans
• Timeliness
• Cost of plans
• Hazard vulnerability analyses
• Public information briefings
• Education efforts, such as brochures and websites
Summary
• LEMAs should be organized and managed well, as should the tasks of
developing emergency organizations, and creating emergency operating
plans. All of these tasks are outcomes based and all of them will rely on
your ability to organize resources, find funding, and communicate well.
Key Terms
• Contingency fund
• Disaster subculture
• LEMA
Warning Processing
• Decisions about how to respond to a hazard begin with risk identification.
• Important sources are warning messages from authorities, the media,
and peers.
Introduction to Emergency Management 35
Strategic Analysis
• You should know basic information about your community’s ethnic compo-
sition, communication channels, perception of authorities, levels of educa-
tion, and income distribution.
• The hazards that produce the greatest community conflict are those that
have a potential for inflicting significant harm on bystanders.
• To be successful, your risk communication program must foster people’s
sense of personal responsibility for self-protection.
• Recognize that even the most effectively implemented risk communica-
tion program may not lead a large percentage of people to take immedi-
ate protective action.
Operational Analysis
• There are five tasks to complete when performing an operational analysis.
• Task 1: Identify and assess feasible hazard adjustments for the commu-
nity and its households/businesses.
• Task 2: Identify ways to provide incentives, sanctions, and technologi-
cal innovations.
• Task 3: Identify the available risk communication sources in the
community.
• Task 4: Identify the available risk communication channels in the
community.
• Task 5: Identify specific audience segments.
Resource Mobilization
• As an emergency manager, there are five tasks you must perform to mobi-
lize resources for risk communication.
• Task 1: Obtain the support of senior appointed and elected officials.
• Task 2: Enlist the participation of other government agencies.
• Task 3: Enlist the participation of nongovernmental and private sector
organizations.
• Task 4: Work with the mass media.
• Task 5: Work with neighborhood associations and civic organizations.
Program Development
• There are five tasks in the program development step.
• Task 1: Staff and train a crisis communication team.
• Task 2: Establish procedures for maintaining an effective communica-
tion flow during an escalating crisis or emergency response.
• Task 3: Develop a comprehensive risk communication program.
• Task 4: Plan to make effective use of informal communication networks.
• Task 5: Establish procedures for obtaining feedback from the news
media and the public.
Introduction to Emergency Management 37
Program Implementation
• There are five tasks you must complete to implement the risk communica-
tion program.
• Task 1: Build source credibility by increasing perceptions of expertise
and trustworthiness.
• Task 2: Use a variety of channels to disseminate hazard information.
• Task 3: Describe community or facility hazard adjustments being
planned or implemented.
• Task 4: Describe feasible household hazard adjustments.
• Task 5: Evaluate program effectiveness.
Risk Communication
• One of the most important incident management actions is risk communi-
cation, which consists of six tasks.
• Task 1: Activate the crisis communication team promptly.
• Task 2: Determine the appropriate time to release sensitive
information.
• Task 3: Select the communication channels that are appropriate to the
situation.
• Task 4: Maintain source credibility with the news media and the
public.
• Task 5: Provide timely and accurate information about the hazard to the
news media and the public.
• Task 6: Evaluate performance through post-incident critiques.
Summary
• You learned how critical communication is when it comes to influencing
people’s perceptions of danger. Apply the communication skills discussed
in this lesson, and you just might save lives.
38 Handbook of Emergency Management Concepts
Key Terms
• Adaptive plan
• Escalating crisis
• Risk
• Risk assessment
• Warning
Meteorological Hazards
• Severe storms have wind speeds exceeding 58 miles per hour, produce tor-
nadoes, release hail, spawn lightning strikes, and cause flash floods.
• Severe winter storms can immobilize travel, isolate residents of remote
areas, deposit enormous amounts of snow that collapse long-span roofs,
and bring down telephone and electric power lines.
• Heat associated with extreme summer weather can be a silent killer. Heat-
related illnesses include heat cramp, heat syncope, heat exhaustion, and
heat stroke.
• An increased number of tornadoes have been reported during recent years,
suggesting that some long-term changes in climate are also involved.
• For protection from tornadoes, building occupants should go to an interior
room on the lowest floor. Mobile home residents should go to a community
shelter.
• Hurricanes produce four specific threats:
• High winds
• Tornadoes
• Inland flooding
• Storm surge
Wildfires
• Wild land fires burn areas with nothing but natural vegetation for fuel.
• Interface fires burn into areas containing a mixture of natural vegetation
and built structures.
Introduction to Emergency Management 39
Floods
• Flooding is a widespread problem in the United States that accounts for
three-quarters of all presidential disaster declarations (PDDs).
• There are seven different types of flooding that are widely recognized.
• Flood risk areas in the United States are defined by the 100-year flood, an
event that is expected to have a 100-year recurrence interval and, thus, a 1%
chance of occurrence in any given year.
• Three types of automated devices detect imminent flooding: radar, rain
gages, and stream gages.
Storm Surge
• Storm surge is increased height of a body of water that exceeds the normal
tide, most commonly associated with hurricanes.
• Tsunamis are sea waves that are generated by undersea earthquakes, but volca-
nic eruptions or landslides can also cause tsunamis. Tsunamis are rare events.
Over the course of a century, 15,000 earthquakes generated only 124 tsunamis.
• Evacuation to higher ground is the most effective method of protection.
People must evacuate a long distance if they live on low-lying coasts.
Geophysical Hazards
• Threats from volcanoes include lightweight gases and ash that are blasted
high into the air and heavier lava and mud that travel downslope.
• The impacts of volcanic eruption tend to be strongly directional because
ash fall and gases disperse downwind.
• Within an earthquake’s impact area, the primary threats are ground shak-
ing, surface faulting, and ground failure.
• Protective measures can be understood by the common observation that
“earthquakes don’t kill people, falling buildings kill people.”
Technological Hazards
• Hazardous materials (also known as hazmat) are defined as substances that
are “capable of posing unreasonable risk to health, safety, and property”
(Hazardous Material Definitions—Defined Term, https://definedterm.com
/hazardous_material).
• Hazmat shipments result in an average of 280 liquid spills or gaseous
releases per year, the majority occurring in transport.
• 81% take place on the highway and 15% are in rail transportation.
40 Handbook of Emergency Management Concepts
Toxic Chemicals
• Terrorists might attempt to use weaponized toxic agents, which are toxic
chemicals that require smaller doses to achieve disability or death.
• Capabilities needed to respond effectively to a toxic chemical attack are
the same as those needed for an industrial accident. Few communities have
these capabilities.
• In the case of radiological releases, even a late evacuation is better than home
shelter; large building shelter is better than late evacuation; and early evacua-
tion is best of all. The decrease in risk as a function of distance is quite large.
Biological Hazards
• Most biological agents that might be used in deliberate terrorist attacks also
exist as natural hazards.
• Terrorists can spread disease by contaminating the food or water supply, or they
can disperse biological agents in an aerosol cloud to cause inhalation exposure.
Introduction to Emergency Management 41
Summary
• As this section illustrates, each type of hazard has a different cause and
effect. Each hazard also has a distinct set of characteristics and potential
dangers. You must understand what to do to prepare for each type of haz-
ard, inform others of the hazard, and aid others in the event that a hazard
threatens your community.
Key Terms
• 100-year flood
• Earthquake
• Explosives
• Firestorms
• Flood
• Hazmat
• Hurricane
• Interface fires
• Natural hazards
• Severe storms
• Storm surge
• Technological hazards
• Tornadoes
• Tsunamis
• Wild land fires
Still Hazardous
• Lightning strikes 100 times per second.
• Late summer, an average of five hurricanes developing
• Four tornadoes per day or 600–1,000 annually
• 11 blizzards annually in the United States
Atmospheric-Sourced Processes
• Tropical cyclones
• Thunderstorms
• Tornadoes
• Lightning
• Hailstorms
• Windstorms
• Ice storms
• Snowstorms
• Blizzards
• Cold waves
• Heat waves
• Avalanches
• Fog
• Frost
Geological-Sourced Processes
• Earthquakes
• Volcanoes
• Tsunami
• Landslides
• Subsidence
• Mudflows
• Sinkholes
Hydrological-Sourced Processes
• Floods
• Droughts
• Wildfires
Introduction to Emergency Management 43
Extraterrestrial Processes
• Meteorites
• Asteroids
• Solar Flares
• Space Debris
Biological Processes
• Diseases
• Epidemics
• Pandemics
• Overpopulation
• Famine
Anthropogenic Nonintentional
• Technological
• Hazardous Materials
• Environmental
• Industrial
• Mining
• Nuclear
• Transportation
• Structural
• Industrial
• Mining
Technological
• Acts of people
• Technological systems that fail because of complexities and human fallibil-
ity (accidents)
Nuclear
• Power plants
• Industrial use
• Medical use
Transportation
• Aviation
• Highways
• Railroads
• Maritime
44 Handbook of Emergency Management Concepts
Structural
• Fires
• Collapse
Mass Shootings
• School shootings
• Workplace violence
• Hate crimes
• Public shooting
Civil Disobedience
• Labor riots
• Race riots
• Political riots
Terrorism
• State/state sponsored
• International nonstate
• Domestic
• Chemical
• Biological
• Nuclear/radiological
• Explosives
Preimpact Conditions
• Three pre-impact conditions must be considered:
• Hazard exposure (living, working, or being in places that can be
affected by hazard impacts)
• Physical vulnerability (human, agricultural, or structural susceptibility
to damage or injury from disasters)
• Social vulnerability (lack of psychological, social, economic, and polit-
ical resources to cope with disaster impacts)
Event-Specific Conditions
• Three event-specific conditions affect a disaster’s impact on the community:
• Hazard event characteristics
– Each hazard has six significant characteristics.
• Improvised disaster responses
– When existing organizations seem incapable of meeting needs,
they expand with new members or extend with new tasks, or new
organizations emerge.
• Improvised disaster recovery
– Improvised recovery tasks may include damage assessment, debris
clearance, reconstruction of infrastructure (e.g., electric power,
fuel, water, wastewater, telecommunications, and transportation
networks), and reconstruction of buildings in the residential, com-
mercial, and industrial sectors.
Social Impacts
• Long-term social effects of disasters tend to be minimal in the United
States.
• Psychosocial impacts are usually mild and brief.
• The largest demographic impacts of disasters are due to immigration
and emigration.
• Economic impact losses are difficult to measure because not all infor-
mation is recorded.
• Political impacts can create conflict as one group’s attempts to solve its
problems create problems for other groups.
Interventions
• There are three sets of actions that can reduce losses.
• Hazard mitigation practices do not require people to take action when
a disaster strikes. These practices usually involve physical preventive
measures.
• Emergency preparedness practices are preimpact actions that provide
resources to support active responses at the time of hazard impact.
46 Handbook of Emergency Management Concepts
RRT areas
I
X
V II
VIII
III
IX
VII
IV
VI
Alaska
Caribbean
Oceania Puerto Rico
Hawaii U.S. Virgin Islands
Guam
Northern Marianas
Pacific Islands Gov’ts
American Somoa
Vulnerability Analysis
• HAZUS-MH is a computer program that predicts losses from earthquakes,
floods, and hurricane winds. It features three levels of analysis (Hazus
Overview, https://www.fema.gov/hazus-mh-overview):
• Level 1 is an initial screen that identifies the communities at highest
risk.
• Level 2 takes refined data and hazard maps to produce more accurate
estimates.
• Level 3 uses community-specific information to produce the most accu-
rate loss estimates.
• Federal and state agencies have generated many hazard analysis documents that
are available on various Web sites (e.g., Social Impacts of Disaster Training,
fema.gov/hiedu/docs/fem/chapter).
• This allows users to access information that might take those months to
obtain if they were to request paper copy.
Assessing Risk
• FEMA’s Multi-Hazard Identification and Risk Assessment program, as well
as information from state and federal agency websites, can identify the haz-
ards to which a community is exposed. This is a good start, but it is not
enough.
• You need enough HVA data to decide how to allocate resources among
hazard mitigation, emergency response preparedness, and disaster recovery
preparedness.
48 Handbook of Emergency Management Concepts
• You also need HVA data to lobby for more money. Emergency management
must compete with other community needs such as education, health care,
and transportation. In this case, the HVA should be specific enough for you
to persuade others that an increase in funding will benefit the community.
Summary
• As an emergency manager, you must be aware of the factors that make a com-
munity vulnerable to a disaster, identify key groups of people that are most likely
to be affected, and understand the level of impact that a disaster will have on a
community. With these details in mind, you can determine how to best protect
your community using mitigation practices and emergency response practices.
Key Terms
• Agricultural vulnerability
• Emergency preparedness practices
• Hazard exposure
• Hazard mitigation practices
• HAZUS-MH
• Human vulnerability
• Multi-Hazard Identification and Risk Assessment
• Physical vulnerability
• Social vulnerability
• Vulnerable zone (VZ)
HAZARD MITIGATION
Hazard Mitigation
• Hazard mitigation is most effective when it takes place before disasters.
• The federal government cannot intervene directly in local land-use or
building construction practices.
• The federal government wants to change these practices because it pays
for much of the high cost of disaster recovery.
• States have encouraged local governments to include hazard mitigation
objectives in their everyday investment policies to reduce community haz-
ard vulnerability.
Mitigation Strategies
• Hazard source control does not work for most natural hazards, with some
exceptions.
• The four major types of flood control works are as follows:
• Stream channelization
Introduction to Emergency Management 49
• Dams
• Levees
• Floodwalls
• Levees have a number of design, construction, and maintenance problems.
• Floodwalls are built of strong materials, such as concrete, and are more
expensive than levees, but they are also stronger.
• Landslide controls are designed to reduce shear stress, increase shear resis-
tance, or a combination of the two.
• Industrial hazard controls are used to confine hazardous materials flows.
• Dikes can be constructed around storage tanks to confine any liquid
releases that might occur.
• Such protection works are especially common around petroleum stor-
age tanks.
Land-Use Practices
• The local government can influence land-use practices through the use of
risk communication, incentives, and sanctions.
• Local governments have a variety of land-use management practices avail-
able to them that can be used to reduce hazard exposure.
• Some states require local governments to develop comprehensive plans that
include land-use elements and environmental hazards elements.
• Tools available to local governments for hazard mitigation are zoning, sub-
division regulations, capital improvements programs, acquisition of prop-
erty or development rights, and fiscal policies.
• One advantage of a comprehensive plan is the increased likelihood that
hazard mitigation measures will be area-wide rather than site-specific.
• A mitigation plan should be based on the HVA.
• Zoning can keep residential and commercial property away from earth-
quake fault lines, floodplains, explosions, and/or hazmat releases.
Structural Protection
• For wildfire hazards, a structure should be built with its exterior walls or
roof constructed of nonflammable materials.
• For wind hazards, the best solution is to install stronger-than-normal con-
nections among the foundation, walls, rafters or roof trusses, and roof
decking.
• Many of the basic principles for protecting buildings from wind hazards
also apply to seismic protection.
• T-shaped, L-shaped, and U-shaped buildings are much more vulnerable
than rectangular buildings.
• Buildings constructed from masonry respond poorly to earthquakes
because they are too rigid.
• Buildings can provide protection from inhalation of hazmat.
• In-place sheltering is more effective than most people believe.
• Local building codes are based on model building codes established by
nongovernmental organizations (NGOs).
• Code adoption is only the first step in reducing vulnerability. The sec-
ond step is to train building contractors and construction workers.
• For most hazards, protecting buildings from damage also protects the
buildings’ contents from harm.
Natural Hazards
• Local governments can devise hazard mitigation programs. Such programs
should emphasize the following:
• Preventive actions must be decided at the local level.
• Private sector participation is vital.
• Long-term efforts and investments in prevention measures are essential.
• There is a connection between disaster reduction and sustainable development.
• It is important to realize that development is not the same as growth.
Introduction to Emergency Management 51
Summary
• This section looked at hazard mitigation strategies and mitigation mea-
sures. It explained how building construction practices, land-use practices,
and other mitigation legalities affect mitigation in communities. It is your
responsibility to also know how to manage the risks of natural and techno-
logical hazards by reducing them.
Key Terms
• Channelization
• Floodwalls
• Hazard mitigation
• Industrial hazard controls
• Land-use practices
• Levees
• Right-to-know (RTK) provisions
• Sustainable development
Victim Response
• One common misconception is that there is a single “public” or “population.”
• In reality, population segments differ in their willingness and ability to
evacuate.
52 Handbook of Emergency Management Concepts
Integrative Responses
• The therapeutic community response is related to convergence.
• Although convergence provides resources, it can also hamper response.
• A second aspect of the positive social response is sympathetic behavior
from the public.
• This promotes positive psychological outcomes for disaster victims;
however, it is short-lived.
Warnings
• The effectiveness of a given warning method varies with the types of activi-
ties in which people are engaged.
• Available warning methods are face-to-face, route alert, siren, commer-
cial radio and television, tone alert radio, telephones, and newspapers.
• There is substantial variation across communities in the relative importance
of different warning sources to different ethnic groups.
• People also use their own preexisting beliefs about appropriate protective
actions.
Evacuation
• Evacuation trip generation refers to the number and location of vehicles
evacuating from a risk area.
• Evacuations initiated during daytime hours should include time for
travel from work or school to home.
• As much as one-third or more of the households in some cities are depen-
dent on public transportation (Public Transportation’s Demographic Divide,
www.governing.com/topics/transportation...public-transportation).
• Warning compliance refers to the percentage of people warned to evacuate
who actually do so.
• Spontaneous evacuation refers to the percentage of people who were not
warned to evacuate but do so anyway.
• When considering departure timing, you must consider two distinct popula-
tion groups: residents and transients.
• It is important to estimate the percentage of early evacuating house-
holds (those who evacuate before an official warning) and the distribu-
tion of departure times for households leaving after an official warning
is issued.
• There are four factors defining evacuees’ destination/route choice:
• Ultimate evacuation destination
• Proximate destination (where the evacuees leave the risk area)
Introduction to Emergency Management 53
• Route choice
• Primary evacuation route utilization (the percentage of evacuating
vehicles using official evacuation routes)
Household Behavior
• People threatened by disaster have multiple sources of information, and
none is considered completely credible.
• Fear is rarely so overwhelming that it prevents people from responding,
but it does impair people’s ability to reason through complex, unfamiliar
problems. To help people overcome fear, be sure to:
• Provide clear, direct, relevant information about the hazard agent.
• Inform people of the hazard’s potential personal consequences.
• Let people know what the authorities are doing to protect them.
• Tell people how they can receive additional information.
• Official warning messages must include recommended protective actions.
• Without recommended protective actions, people take the most appropriate
actions they already know or that they are told about by peers or the media
(even if the action is incorrect for the hazard).
• The level of compliance with a warning is contingent upon the information
source, message content, receiver characteristics, and situational character-
istics such as threat familiarity and urgency for response.
• Some of those who are not at risk will also comply with protective action
recommendations (spontaneous evacuation).
• You should assume that many risk area residents have disaster-relevant
competencies.
• Recognize the differences among households and, especially, avoid the
error of assuming other households are just like yours.
Summary
• Because you can predict some behaviors, it’s important you develop plans
to respond to those behaviors. As emergency managers, you have to dis-
seminate information to those who seek it, and you have to ensure that
you’ve given appropriate warnings, solutions for protection, and even plans
for organizing the people who show up to help after a disaster.
Key Terms
• Evacuation trip generation
• Panic
Response Functions
• Basic emergency response functions include emergency assessment and
hazard operations:
• Emergency assessment is the process of detecting a threat, predicting
its potential impact, and determining how to respond.
Introduction to Emergency Management 55
Organizational Structures
• Organizational structures should
• Form the basis of a larger structure to deal with disasters.
• Be flexible.
• The ICS has seven basic principles (National Incident Management System
[NIMS], https://training.fema.gov/nims).
• ICS was changed so that it could be used readily in both small and large
events; the result was called the Incident Management System (IMS).
• The major advantage of IMS is that it makes all resources available for
every incident.
IMS Implementation
• The goal of an articulated command is to spread functions to specialists.
• Most jurisdictions provide for the command staff to be supported by an
on-scene public information officer and a police liaison.
56 Handbook of Emergency Management Concepts
• The advantage of IMS over the earlier ICS is that it provides for a better account-
ing of the activities that must be performed away from the incident scene.
• IMS is a flexible structure with close linkage between emergency plans and
operations.
• IMS can only be executed effectively if emergency responders are thor-
oughly trained before incidents occur.
Organizational Structures
• Three of the most important organizational structures include the following:
• Metropolitan Medical Response System (MMRS) (MMRS Program,
www.dhses.ny.gov/grants/hsgp/FY09_MMRS_Program_Guidance.pdf)
• Urban Areas Security Initiative (UASI) (Homeland Security, www
.dhs.gov)
• NIMS (National Incident Management System, NIMS-FEMA.gov, https://
www.fema.gov/national-incident-management-system)
EOP Components
• EOPs should have four basic components:
• Basic plan: The provisions of the basic plan are captured under seven
separate headings.
• Functional annex: Each annex should describe how the emergency
response organization will perform a function needed to respond to
disaster demands.
• Hazard-specific appendixes: These provide information about the ways
in which the response to a particular hazard agent differs from the stan-
dard response.
• Standard operating procedures and checklists: These list the steps that
individuals and organizations will take to perform specific emergency
response tasks.
Summary
• As an emergency responder, you strive to prevent casualties and damage
in a disaster situation. As evidenced from recent natural disasters such as
Hurricanes Katrina and Rita and terrorist attacks such as those on 9/11,
emergency managers must develop a state of readiness to respond to
extreme events threatening their communities.
Key Terms
• Emergency assessment
• Functional annex
58 Handbook of Emergency Management Concepts
Hazard Monitoring
• The hazard agent must be tracked over time to determine whether the threat
is changing in its likelihood, magnitude, immediacy, or location of impact
or whether there are changing environmental conditions.
• For hazmat releases, responders should do the following before the appro-
priate monitoring equipment arrives:
• Establish a perimeter around the scene.
• Prevent entry into the “hot zone.”
• Decontaminate anyone who has been exposed.
• Maintain medical observation and isolation until released by a compe-
tent medical authority.
Hazard Operations
• Hazard operation actions are implemented only when the need arises.
These actions must be able to be implemented rapidly.
Introduction to Emergency Management 59
Population Protection
• Information collected through the emergency assessment function forms
the basis for the population protection function.
• The appropriate protective strategy varies based on the following factors:
• Type of environmental threat
• Certainty of occurrence
• Severity of impact
• Immediacy of impact
• Duration of impact
• During an emergency, specific warnings should be disseminated by expert
and credible sources.
• These warnings should describe the threat in terms of its location,
severity, and expected time of impact.
The warnings should also recommend appropriate protective actions and indicate
how to obtain additional information.
Protective Actions
• People might need the following elements to implement protective actions:
• Money
• Knowledge and physical skill
• Facilities and vehicles
• Tools and equipment
• Time and energy
• Social cooperation
• Three population segments will need help in an evacuation.
Population Protection
• To establish impact zone access control and security, you should take the
following steps:
• Set up traffic control points on major routes at the perimeter of the
impact area to prevent people from entering without authorization.
• Provide security patrols within the impact area.
60 Handbook of Emergency Management Concepts
• For search and rescue operations, you should directly address the need for
heavy rescue. This includes the following tasks:
• Assigning a lead agency.
• Maintaining a list of available heavy rescue equipment.
• Establishing decision criteria for prioritizing buildings in the event of
multiple collapses.
• Creating a protocol for quickly obtaining services of victim location
specialists.
Care of Victims
• Emergency authorities provide short-term support for victims in the form of
food, accommodations, and limited medical care.
• Evacuee registration provides a link to the population monitoring function,
especially accountability and casualty assessment.
• Experience has shown that not allowing pets discourages needy families
from using shelters.
Exposure Control
• Hazard exposure control seeks to reduce exposure to a level that is as low
as reasonably achievable.
• Emergency personnel can achieve the as low as reasonably achievable
(ALARA) objective in three ways:
• Minimizing the amount of time spent in hazardous areas (time).
• Staying as far away from hazard sources as necessary (distance).
• Insulating themselves from the hazard (shielding).
• Many communities use hazmat response teams to test for, abate, and moni-
tor chemical, biological, and radiological (CBR) contamination.
• A CBR contaminated area might also be a crime scene and may therefore
involve FBI participation.
Introduction to Emergency Management 61
Incident Management
• The concept of operations is a summary statement of what emergency func-
tions are to be performed and how they are to be accomplished.
• Notification to the jurisdictional authorities comes from different sources,
depending on the nature of the threat.
• The notification process differs among different types of hazards.
• EOCs are the hub of emergency information processing within the
jurisdiction.
• The need for organizations to be represented in the EOC depends on the
nature of the threat as well as the network of governmental resources
needed to respond to that threat.
• The communications team collects, displays, and records data on
environmental conditions, casualties, and damage to property and the
environment.
• Communication logs should record who called into or out of the EOC,
when the call took place, who participated in the call, and the content of
the call.
• Analysis/planning teams assess the current status of the situation and proj-
ect its future status.
• The location from which public information is given depends upon the size
of the incident and upon whether emergency operations are taking place at
a defined incident scene.
• Incident managers should designate a broadly knowledgeable chief
spokesperson who can call upon specialists to respond to specific
questions.
• Administrative and logistical support is handled at the incident command
post during minor events. However, it is transferred to the EOC during a
community-wide disaster.
Summary
• The EOP and procedures developed during the emergency preparedness
phase affect the actions you take during emergency response. However, no
emergency can ever be predicted with accuracy; therefore, it is important
that you learn to improvise effectively when the need arises. Focus on the
four basic functions: emergency assessment, hazard operations, population
protection, and incident management. Understand what tasks are associated
with each of these basic functions.
Key Terms
• Concept of operations
• Damage assessment
• Emergency classification system
62 Handbook of Emergency Management Concepts
DISASTER RECOVERY
Communities
• A community is a specific geographic area (town, city, or county) with a
government.
• Two additional elements of community are psychological ties and social
interaction.
• If a disaster causes members of a community’s households to change their
normal patterns of daily activity, this can cause psychological and eco-
nomic distress and social conflict.
• A community’s industries that produce exports should receive immediate
attention in the aftermath of a disaster to stimulate economic activity.
Recovery Process
• Recovery begins when the emergency has been stabilized so there is no
longer a threat to life and property.
• Disaster recovery is both physical and social.
• Restoring the community to its previous status can reproduce the hazard
vulnerability that led to the disaster.
• A disaster-resilient community learns how to use a disaster as a focusing
event that changes people’s behavior.
• Developing preimpact plans for disaster recovery is important because
there will not be much time for recovery planning after disaster strikes.
Household Recovery
• Households typically pass through four stages of housing recovery follow-
ing a disaster: emergency shelter, temporary shelter, temporary housing,
and permanent housing.
• Households lacking adequate insurance coverage must use other strategies
for recovery, such as the following:
• Obtaining Small Business Administration or commercial loans
• Seeking FEMA or NGO grants
• Withdrawing personal savings
• Not replacing damaged items
• There are differences in the rate of economic recovery among ethnic groups.
• Few victims develop major psychological problems from disasters. Most
people experience only mild distress.
• Work with local mental health agencies to ensure that an organized mental
health referral system will be available for people in higher risk groups.
• Households can be characterized in terms of three modes of disaster recovery:
• Autonomous recovery
• Kinship recovery
• Institutional recovery
Introduction to Emergency Management 63
Business Recovery
• During and after a disaster, disruption of infrastructure such as water/
sewer, electric power, fuel, transportation, and telecommunications may
force businesses to shut down.
• Small businesses are more vulnerable than large businesses for two impor-
tant reasons:
• They are more likely to be located in nonengineered buildings that
become damaged.
• They are less likely to have hazard management programs to reduce
their physical vulnerability.
• Wholesale and retail businesses report significant sales losses following
disasters. However, manufacturing and construction companies often show
gains.
Short-Term Recovery
• The first benefit of disaster assessment is that it guides short-term recovery,
which consists of the following eight tasks performed in the immediate
aftermath of a disaster:
• Impact area security and reentry
• Temporary shelter/housing
• Infrastructure restoration
• Debris management
• Emergency demolition
• Repair permitting
• Donations management
• Disaster assistance
Long-Term Reconstruction
• A disaster opens a window of opportunity to change a community’s hazard
management policy.
• Over the long-term, a community should avoid increases in vulnerability by
making changes in its land-use and building construction practices.
• During reconstruction, waterborne illnesses may be a problem if survi-
vors drink from, wash food in, or bathe in water sources that have been
contaminated.
• Note that natural disasters produce minimal mental health consequences.
• Hazmat spills are an increasing problem during natural disasters.
• In communities that are highly dependent on tourism, active promotion is
needed to assure potential visitors that all facilities are back in operation
following a disaster.
Recovery Management
• To manage disaster recovery, you need to perform many of the same types
of tasks as during the incident management function of the emergency
response phase.
• The recovery process typically involves the same tasks that agencies per-
form as part of their normal duties.
• The ROP should describe the procedure for providing public information.
Introduction to Emergency Management 65
Summary
• Once disaster strikes, recovery takes center stage as many organizations
and people come together to rebuild. Recovery involves households, busi-
nesses, and communities. Working together and understanding the obsta-
cles can aid in the recovery process. It is important to utilize the state and
federal governments and various charities to assist people and groups in
restoring the community’s normal patterns of social functioning.
Key Terms
• Community
• Emergency shelter
• Permanent housing
• Preliminary damage assessment
• Rapid assessment
• Site assessment
• Temporary housing
• Temporary shelter
• Victims’ needs assessment
EVALUATION
Performance Appraisals
• Personnel performance appraisals serve four functions: development,
reward, internal research, and legal protection.
• Appraisals should be conducted at least once a year.
• Performance should be rated based on data that meet three conditions:
• The data must be available within the time period in which the appraisal
is being conducted.
• The data must be relevant to job performance.
• The data must be comprehensive.
• When conducting an appraisal, ensure that both the short-term and long-
term aspects of the job are evaluated.
• Human resource departments typically have performance appraisal criteria
devised for all civil service jobs.
• There are nine typical performance appraisal categories.
66 Handbook of Emergency Management Concepts
Organizational Evaluation
• Work with the other members of the LEMA and the LEMC to set specific, mea-
surable objectives that can be accomplished within the period of performance.
• Evaluating the performance of the LEMC is more complex than evaluating
that of the LEMA, but it involves basically the same procedures.
• Your control over the allocation of resources in the LEMC is more limited
than your control over the LEMA.
Summary
• Given how important emergency management is, you must hold people
accountable for their job responsibilities in this area. This chapter shows you
how to conduct your own performance appraisals and how to prepare drills and
exercises to assess the performance of your emergency response organization.
Key Terms
• CAR program
• Controller
• Drills
• Evaluator
• Full-scale exercise
• Functional exercise
• Task work
• Teamwork
Economic Resources
• Hazard insurance availability varies from one country to the next.
• Availability of “specialized assets” is a factor affecting emergency man-
agement. These assets may include heavy equipment, trained urban search
and rescue teams, hazmat capabilities, technical expertise such as GIS, and
training facilities.
• The control of policies, programs, and resources at the national level limits
the ability of local governments to mount a rapid emergency response.
Government Organization
• Too much emphasis on large disasters tends to lead to the over centraliza-
tion of disaster management.
• Few countries have an adequate supply of well-trained emergency manage-
ment professionals.
70 Handbook of Emergency Management Concepts
India’s Recovery
• As in many poor countries, emergency management in India has been pri-
marily reactive, concentrating on relief after major disasters.
• The Maharashtra Emergency Earthquake Reconstruction Program focused
on reconstruction and rehabilitation (India—Maharashtra Emergency
Earthquake Rehabilitation documents.worldbank.org).
Introduction to Emergency Management 71
Land-Use in Colombia
• Colombia is vulnerable to several hazards, including volcanoes, earth-
quakes, floods, and landslides.
• Colombia’s Territorial Development Law includes provisions for natu-
ral hazard risk assessment, land-use planning, and urban development
(“Organic Law of Territorial Organization in Colombia,” https://wp.nyu
.edu/mariamonicasalazartamayo/wp-content/uploads/). The law provides
detailed directions on the elements to be included in land-use plans.
• Colombia’s law is remarkable because its requirements are more stringent
than those that many states in the United States place on local governments.
This law is also interesting in the way it incorporates hazard mitigation
directly into the fabric of local land-use planning.
Seveso Directives
• The Seveso Directives (Seveso Directives—Major Accident Hazards—
Environment—European ec.europa.eu/environment/seveso. It also is a plan
for international use with US involvement):
• Incorporate many of the community RTK provisions set forth in SARA
Title III.
• Go further by requiring active dissemination of information to the
public.
• Use land-use planning to manage chemical hazards.
• The primary goal of the Seveso Directives is to prevent hazmat accidents.
The secondary goal is to limit the health, safety, and environmental conse-
quences of any accidents that do occur.
• Seveso II requires the operator of each hazmat facility to develop an on-site
emergency response plan and supply it to local authorities. The local authori-
ties must then use each facility’s on-site plans to develop their own EOPs.
Chi-Chi Earthquake
• In 1999, a 7.6-magnitude earthquake hit Taiwan. Known as the Chi-Chi
earthquake, it caused 2,400 deaths and 11,000 injuries requiring medical
attention (Chi-Chi, Taiwan Earthquake Event Report, forms2.rms.com/rs
/729-DJX565/images/eq_chi_chi_taiwan_eq.pdf).
72 Handbook of Emergency Management Concepts
Summary
• People are now much more aware of natural disasters than they were in the
past. And, countries are able to collaborate more easily to provide assis-
tance. Responding to natural disasters often brings the world together, as
evidenced by the devastating tsunami of December 2004.
PROFESSIONAL ACCOUNTABILITY
Distinguishing Emergency Management
• Emergency managers have knowledge about a wide range of hazards and
must know how to manage a community’s vulnerability.
• Emergency responders directly respond to disasters, attacking the threat to
reduce potential disaster losses.
• Public-sector emergency managers work for all levels of government—
federal, state, and local.
• Private-sector emergency managers work for organizations such as chemi-
cal facilities, nuclear power plants, and railroads.
• The final distinction is among local, state, and federal emergency managers.
• For a city or town, emergency management rarely exists as a separate
department. It is often located within a fire or police department.
• State and federal emergency managers have positions that are quite differ-
ent from those of local emergency managers.
• FEMA works with other agencies, such as the Environmental Protection
Agency, Coast Guard, and Department of Transportation.
• Together, they develop programs and provide technical and financial
assistance to LEMAs.
• The principal requirements are the willingness and ability to work with
multidisciplinary teams.
Defining “Profession”
• A profession holds its members accountable to their peers for behavior that
is relevant to the profession.
• Professions have membership rules to exclude unqualified people.
• Membership rules usually relate to education and training requirements.
• A profession has an “evolving and agreed-upon body of knowledge.”
• A defining feature of professions is that they have ethical standards.
Introduction to Emergency Management 73
Body of Knowledge
• Emergency management is an interdisciplinary profession, so you must
always draw upon knowledge in the physical and social sciences.
• In addition to their other duties, emergency managers may want to conduct
research.
• In asserting their credibility to the public, emergency managers are set
apart from other professions by their body of knowledge.
• Organizations are attempting to explicitly define the emergency management
body of knowledge. The FEMA Higher Education Project is contributing to
this effort by examining how to develop an accreditation system for degree
programs.
Academic Programs
• The growth of academic degree programs to support a profession represents
the maturing of that profession.
• Professional degree programs do the following:
• They help you acquire principles and procedures from different theo-
retically organized disciplines.
• They bring together practitioners and researchers.
• To serve the profession, degree programs must achieve some level of stan-
dardization. There must be an assurance that graduates of degree programs
know the body of professional knowledge.
• FEMA has created a learning resource center and posted sample syllabi for
a wide range of classes. The agency has also developed full college courses
with instructor guides, readings, exercises, field trips, and student notes.
Legal Liability
• Legal liability applies more to organizations and government agencies than
to individuals.
• It is important to note that emergency management statutes vary widely among
the states, as do the emergency powers that are available to address disasters.
• Two areas of legal concern commonly arise:
• The claim that, in responding to an emergency, government officials
caused damage to persons or property.
• The claim that a government’s failure to plan for or respond to a disaster
resulted in damage to persons or property.
• Three exceptions to immunity are important for emergency managers:
• Claims for damages may not be brought in connection with the imposi-
tion of quarantine.
• A person may not bring suit if federal agencies or employees can dem-
onstrate that they exercised “due care” in carrying out a statute.
• The “discretionary function exception” provides immunity for federal
agencies and employees when a claim is based on the “exercise or per-
formance or failure to exercise or perform” a discretionary action.
• Immunity is recognized unless it can be shown that some form of negli-
gence exists.
• To mount a successful defense, a jurisdiction needs to document that it has
a technically sound emergency plan.
Introduction to Emergency Management 75
Summary
• Emergency management is a challenging career that is maturing as a pro-
fession. There are education, training, and certification opportunities, as
well as professional associations you can belong to that will help you in
your career.
Key Terms
• Certification
• Emergency manager
• Emergency responder
• Profession
Opportunities
• Policymakers need to understand the causes of hazards to manage them
effectively.
• People are becoming aware that the state of our environment is a major fac-
tor in the occurrence of disasters.
• There are many rapidly developing technologies to support emergency
management.
• You will be more effective if you can show that it is less expensive to miti-
gate hazards than to rebuild after a disaster.
• The data you need, together with computer programs such as HAZUS,
are becoming increasingly available.
• The greatest advance in technology has been the availability of GISs.
• Emergency response technologies have improved forecast and warning sys-
tems for a variety of different hazards.
• There are more ways to record and communicate information than ever before.
• There will continue to be significant advances in the communication tech-
nology used to warn residents about hazards.
• In disaster recovery, you can use many of the common technology tools to
quickly assess damage and send the information back to the EOC.
National Challenges
• Much of the future increase in the U.S. population will occur in hazard-
prone areas.
• Emergency managers need to promote smart growth that minimizes disas-
ter losses.
• Property owners in disaster-prone areas are being subsidized by other
taxpayers.
• There will continue to be an increase in the cultural and language diversity
of the population.
• Rich communities will be able to adopt new technology, but poor commu-
nities may not have the money to do so.
Terrorist Threats
• Plans for responding to terrorist threats can include many of the procedures
you expect to use for technological accidents.
• Terrorist threats also present new challenges, however.
• Exotic chemicals such as sarin gas, “dirty bombs,” and biohazards pres-
ent different problems from technological accidents.
• An intelligent adversary creates some important information security
problems.
Introduction to Emergency Management 77
National Challenges
• In the past, emergency management was a low priority on the government
agenda. This changed dramatically after 9/11.
• It is important for emergency managers to build coalitions with other agen-
cies, NGOs, and private-sector organizations.
• Legal liability is a major issue because each state has different rules regard-
ing liability in an emergency response.
• There is a conflict between the goals of economic development and private
property rights versus the goals of public safety and welfare.
Professional Challenges
• Many emergency managers have limited contact with land-use planners
and public health departments.
• Cooperation between emergency managers and disaster researchers is not
easy.
• This situation seems to be changing for the better.
• Professors in emergency management and related fields now have
greater contact with emergency managers.
• There are increasing numbers of research projects designed to solve
practical problems.
Professional Opportunities
• Recent years have seen an increase in graduates holding postsecondary
degrees in emergency management.
• The need for emergency managers to become involved in hazard mitigation
has been recognized for many years.
• Preimpact recovery planning provides opportunities to work with land-use
planners and building construction officials.
• Emergency managers’ knowledge and skills in preparing communi-
ties for unexpected events makes them an invaluable consultant to senior
administrators.
• Collaboration among jurisdictions within a region or between levels of gov-
ernment requires some degree of organizational standardization.
Summary
There are many challenges and opportunities facing emergency managers at the
global, national, and local levels. It is essential that communication improves so that
emergency managers can collaborate with other professionals for better preparedness.
http://taylorandfrancis.com
3 Security Management
LOSS PREVENTION
Loss prevention focuses on what your critical assets are and how you are going to
protect them. A key component to loss prevention is assessing the potential threats
to the successful achievement of the goal. This must include the potential opportu-
nities that further the object (why take the risk unless there’s an upside?). Balance
probability and impact determine and implement measures to minimize or eliminate
those threats.
Internal
Strategic: R&D operational: systems and process (H&R, Payroll)
Financial: liquidity, cash flow
79
80 Handbook of Emergency Management Concepts
Plan
(what, when,
how)
Monitor
Assess
and report
(identify and
(know what’s
analyze)
happening)
Handle
(mitigate the
risk)
Output
Step 1 Definition of examples
security policy Policy
document
Definition of
Step 2 ISMS scope Scope of
Input examples
the ISMS
Threats,
Step 3 impacts List of
vulnerabilities Risk assessment assessed
risks
Risk
management Risk management
Step 4 strategy Identified
weaknesses
Focus of the site for assets
Additional
controls Selection of
Step 5 controls Strength of
controls and
implementation
Step 6 Statement of
Statement of
applicability applicability
RISK OPTIONS
Risk Avoidance
This is the first choice to be considered. The possibility of eliminating the existence
of criminal opportunity or avoiding the creation of such an opportunity is always the
Security Management 81
best solution, when additional considerations or factors are not created as a result of
this action that would create a greater risk. As an example, removing all the cash
from a retail outlet would eliminate the opportunity for stealing the cash—but it
would also eliminate the ability to conduct business.
Risk Reduction
When avoiding or eliminating the criminal opportunity conflicts with the ability to
conduct business, the next step is the reduction of the opportunity and potential loss
to the lowest level consistent with the function of the business. In the example above,
the application of risk reduction might result in the business keeping only enough
cash on hand for one day’s operation.
Risk Spreading
Assets that remain exposed after the application of reduction and avoidance are the
subjects of risk spreading. This is the concept that limits loss or potential losses by
exposing the perpetrator to the probability of detection and apprehension prior to
the consummation of the crime through the application of perimeter lighting, barred
windows, and intrusion detection systems. The idea here is to reduce the time avail-
able to steal assets and escape without apprehension.
Risk Transfer
Risk transfer involves transferring risks to other alternatives when those risks have
not been reduced to acceptable levels. The two primary methods of accomplishing
risk transfer are to insure the assets or raise prices to cover the loss in the event of
a criminal act. Generally speaking, when the first three steps have been properly
applied, the cost of transferring risks is much lower.
Risk Acceptance
All remaining risks must simply be assumed by the business as a risk of doing busi-
ness. Included with these accepted losses are deductibles that have been made as part
of the insurance coverage.
Procedures
• Coordination with law enforcement agencies
• Fraud management
• Risk management
• Crime Prevention Through Environmental Design (CPTED)
• Risk Analysis
• Risk mitigation
• Contingency planning
WHAT IS SECURITY?
Security is the degree of resistance to, or protection from, harm. It applies to any
vulnerable and valuable asset, such as a person, dwelling, community, item, nation,
or organization.
As noted by the Institute for Security and Open Methodologies in the OSSTMM 3,
security provides “a form of protection where a separation is created between the assets
and the threat” (Linux Magazine, www.linux-magazine.com). These separations are
generically called “controls” and sometimes include changes to the asset or the threat.
Security is said to have two dialogues. Negative dialogue is about danger, risk,
threat, etc. Positive dialogue is about opportunities, interests, profits, etc. Negative
dialogue needs military equipment, armies, or police. Positive dialogue needs social
capital, education, or social interaction.
Categorizing Security
There is an immense literature on the analysis and categorization of security. Part of
the reason for this is that, in most security systems, the “weakest link in the chain”
is the most important. The situation is asymmetric since the “defender” must cover
all points of attack while the attacker need only identify a single weak point upon
which to concentrate.
Describing Categorizing Security: In preparation for selecting and specifying
the appropriate security controls for organizational information systems and their
respective environments of operation, organizations categorize their information and
information system. To categorize the information and information system, complete
the following activities:
Security Concepts
Certain concepts recur throughout different fields of security:
Home Security
Security is something applicable to all of us and involves the hardware in place on
a property and personal security practices. The hardware would be the doors, locks,
alarm systems, and lighting that are installed on your property. Personal security
practices would be ensuring doors are locked, alarms are activated, windows are
closed, and many other routine tasks that act to prevent a burglary.
Computer Security
Computer security, also known as cybersecurity or IT security, is security applied to
computing devices such as computers and smartphones, as well as computer networks
Security Management 85
such as private and public networks, including the whole Internet. The field includes
all five components: hardware, software, data, people, and procedures, by which digi-
tal equipment, information, and services are protected from unintended or unauthor-
ized access, change, or destruction and is of growing importance due to the increasing
reliance of computer systems in most societies. It includes physical security to pre-
vent theft of equipment and information security to protect the data on that equipment.
Those terms generally do not refer to physical security, but a common belief among
computer security experts is that a physical security breach is one of the worst kinds
of security breaches as it generally allows full access to both data and equipment.
3D Security
3D security is a framework promoting development, diplomacy, and defense as secu-
rity strategies.
The 3D security framework recognizes that security challenges like terrorism,
nuclear proliferation, global warming, and SARS or Avian Flu epidemics require a
variety of tools in addressing complex threats. These tools can be categorized broadly
under the headings of Development, Diplomacy, and Defense—the 3Ds of security.
3D security or “whole of government” approaches have been promoted by coun-
tries like Canada and the United Kingdom for a number of years. Now, bipartisan
Congressional leaders and the Bush administration promote 3D security as a new
vision for rethinking security as detailed in the 2006 National Security Strategy.
Development refers to governmental and nongovernmental efforts to build the eco-
nomic, social, and political foundations of stable communities and societies. Diplomacy
refers to communication or negotiation between people to solve shared problems and
address conflicts through political and legal channels. Official State Department negotia-
tions (Track I) and unofficial diplomacy (Track II) between religious, business, aca-
demic, or other civil society leaders work best on parallel tracks resulting in agreements
that are legitimate, widely supported, and sustainable. Defense refers to a wide range of
military tasks, including waging war, peacekeeping, or coordinating disaster response.
GOVERNMENT CLASSIFICATION
The purpose of classification is to protect information. Higher classifications protect
information that might endanger national security. Classification formalizes what
constitutes a “state secret” and accords different levels of protection based on the
expected damage that the information might cause in the wrong hands.
However, classified information is frequently “leaked” to reporters by officials for
political purposes. Several U.S. presidents have leaked sensitive information to get
their point across to the public (“A History of How Israel Out-Foxed US Presidents,”
https://israelpalestinenews.org/history-israel-foxed-us-presidents).
Top Secret
Top secret is the highest level of classified information. Information is further com-
partmented so that specific access using a code word after top secret is a legal way
to hide collective and important information. Such material would cause “exception-
ally grave damage” to national security if made publicly available. Prior to 1942, the
United Kingdom and other members of the British Empire used Most Secret, but this
was changed to match the U.S.’s top secret to simplify allied interoperability.
Security Management 87
Secret
Secret material would cause “serious damage” to national security if it were publicly
available. In the United States, operational “secret” information can be marked with
an additional “LIMDIS,” to limit readership.
Confidential
Confidential material would cause damage or be prejudicial to national security if
publicly available.
Restricted
Restricted material would cause “undesirable effects” if publicly available. Some
countries do not have such a classification; in public sectors, such as commercial
industries, such a level is also called and known as “Private Information.”
Official
Official material forms the generality of government business, public service deliv-
ery, and commercial activity. This includes a diverse range of information, of vary-
ing sensitivities, and with differing consequences resulting from compromise or loss.
Official information must be secured against a threat model that is broadly similar to
that faced by a large private company.
Unclassified
Unclassified is technically not a classification level, but this is a feature of some clas-
sification schemes, used for government documents that do not merit a particular
classification or which have been declassified. This is because the information is
low impact and therefore does not require any special protection, such as vetting of
personnel. A plethora of pseudo-classifications exist under this category.
Clearance
Clearance is a general classification that comprises a variety of rules controlling the
level of permission required to view such classified information, and how it must be
stored, transmitted, and destroyed. Additionally, access is restricted on a “need-to-
know” basis. Simply possessing a clearance does not automatically authorize the
individual to view all material classified at that level or below that level. The indi-
vidual must present a legitimate need to know in addition to the proper level of
clearance.
COMPARTMENTED INFORMATION
In addition to the general risk-based classification levels, additional compartmented
constraints on access exist, such as (in the U.S.) Special Intelligence (SI), which
protects intelligence sources and methods; No Foreign dissemination (NOFORN),
which restricts dissemination to U.S. nationals; and Originator Controlled dis-
semination (ORCON), which ensures that the originator can track possessors of the
information. Information in these compartments is usually marked with specific
keywords in addition to the classification level.
88 Handbook of Emergency Management Concepts
International
When a government agency or group shares information between an agency and
group of other country’s government, they will generally employ a special classifica-
tion scheme that both parties have previously agreed to honor.
For example, the marking ATOMAL is applied to U.S. RESTRICTED DATA
or FORMERLY RESTRICTED DATA and United Kingdom ATOMIC informa-
tion that has been released to NATO. ATOMAL information is marked COSMIC
TOP SECRET ATOMAL (CTSA), NATO SECRET ATOMAL (NSAT), or NATO
CONFIDENTIAL ATOMAL (NCA).
NATO Classifications
For example, sensitive information shared amongst NATO allies has four levels of
security classification; from most to least classified:
United States
Classified Information in the United States
The U.S. classification system is currently established under Executive Order 13526
and has three levels of classification—confidential, secret, and top secret. The United
States had a restricted level during World War II but no longer does. U.S. regulations
state that information received from other countries at the restricted level should be
handled as confidential.
A variety of markings are used for material that is not classified but whose dis-
tribution is limited administratively or by other laws, for example, For Official
Use Only (FOUO) or Sensitive but Unclassified (SBU). The Atomic Energy Act
of 1954 provides for the protection of information related to the design of nuclear
weapons. The term “Restricted Data” is used to denote certain nuclear technology.
Security Management 89
Corporate Classification
Private corporations often require written confidentiality agreements and conduct
background checks on candidates for sensitive positions. The U.S. the Employee
Polygraph Protection Act prohibits private employers from requiring lie detector
tests, but there are a few exceptions. Policies dictating methods for marking and
safeguarding company-sensitive information (e.g., “IBM Confidential”) are com-
mon, and some companies have more than one level. Such information is protected
under trade secret laws. New product development teams are often sequestered and
forbidden to share information about their efforts with uncleared fellow employees,
the original Apple Macintosh project being a famous example. Other activities, such
as mergers and financial report preparation, generally involve similar restrictions.
However, corporate security generally lacks the elaborate hierarchical clearance and
sensitivity structures and the harsh criminal sanctions that give government classifi-
cation systems their particular tone.
RISK
Risk is the potential of gaining or losing something of value. Values (such as physical
health, social status, emotional well-being, or financial wealth) can be gained or lost
90 Handbook of Emergency Management Concepts
when taking risk resulting from a given action or inaction, foreseen or unforeseen.
Risk can also be defined as the intentional interaction with uncertainty. Uncertainty
is a potential, unpredictable, and uncontrollable outcome; risk is a consequence of
action taken in spite of uncertainty.
Risk perception is the subjective judgment that people make about the severity
and probability of a risk and may vary person to person. Any human endeavor car-
ries some risk, but some are much riskier than others.
Definitions
The Oxford English Dictionary cites the earliest use of the word in English (in the
spelling of risqué from its from French original, risqué) as of 1621 and the spelling
as risk from 1655 (https://en.oxforddictionaries.com/definition/risk). It defines risk as:
(Exposure to) the possibility of loss, injury, or other adverse or unwelcome circum-
stance; a chance or situation involving such a possibility.
Areas
Risk Assessment and Analysis
Risk Assessment and Operational Risk Management
Since risk assessment and management are essential in security management, both
are tightly related. Security assessment methodologies like CCTA Risk Analysis and
Management Method contain risk assessment modules as an important part of the
first steps of the methodology. On the other hand, risk assessment methodologies
like Mehari evolved to become security assessment methodologies. An ISO standard
on risk management (Principles and guidelines on implementation) was published
under code ISO 31000 on November 13, 2009.
Quantitative Analysis
There are many formal methods used to “measure” risk.
Often, the probability of a negative event is estimated by using the frequency of
past similar events. Probabilities for rare failures may be difficult to estimate. This
makes risk assessment difficult in hazardous industries, for example, nuclear energy,
where the frequency of failures is rare, while harmful consequences of failure are
severe.
Risk is often measured as the expected value of an undesirable outcome. This
combines the probabilities of various possible events and some assessment of the
corresponding harm into a single value. See also expected utility. The simplest case
is a binary possibility of accident or no accident. The associated formula for calculat-
ing risk is then as follows:
SECURITY INCREASE
A security increase often occurs when a nation, state, or institution has recently suf-
fered from a serious incident or is under the perception that there is an increased risk
for an incident to occur that endangers or potentially endangers its well-being.
92 Handbook of Emergency Management Concepts
Surveillance
A “Nest” of Surveillance Cameras
Surveillance is the monitoring of the behavior, activities, or other changing informa-
tion, usually of people for the purpose of influencing, managing, directing, or pro-
tecting them. This can include observation from a distance by means of electronic
equipment (such as CCTV cameras) or interception of electronically transmitted
information (such as Internet traffic or phone calls), and it can include simple, rela-
tively no- or low-technology methods such as human intelligence agents and postal
interception. Surveillance is the close observation of a person or a group by law
enforcement that conducts investigations into criminal activities; continuous observa-
tion of a place, person, group, or ongoing activity in order to gather information; and
use of a variety of means to collect information; an example is electronic surveillance.
Surveillance is used by governments for intelligence gathering; the prevention of
crime; the protection of a process, person, group or object; or for the investigation of
crime. It is also used by criminal organizations to plan and commit crimes such as rob-
bery and kidnapping, by businesses to gather intelligence, and by private investigators.
Surveillance is often a violation of privacy and is opposed by various civil liber-
ties groups and activists. Liberal democracies have laws that restrict domestic gov-
ernment and private use of surveillance, usually limiting it to circumstances where
public safety is at risk. Authoritarian government seldom have any domestic restric-
tions; and international espionage is common among all types of countries.
Security Management 93
Supporters of surveillance systems believe that these tools can help protect soci-
ety from terrorists and criminals. They argue that surveillance can reduce crime by
three means: by deterrence, by observation, and by reconstruction.
Surveillance can deter by increasing the chance of being caught and by revealing
the modus operandi. This requires a minimal level of invasiveness.
Another method on how surveillance can be used to fight criminal activity is
by linking the information stream obtained from them to a recognition system (for
instance, a camera system that has its feed run through a facial recognition system).
This can, for instance, auto-recognize fugitives and direct police to their location.
A distinction here has to be made, however, on the type of surveillance employed.
Some people that say support video surveillance in city streets may not support
indiscriminate telephone taps and vice versa. Besides the types, the way this surveil-
lance is done also matters a lot; that is, indiscriminate telephone taps are supported
by far fewer people than, say, telephone taps done only to people suspected of engag-
ing in illegal activities (Electronic Surveillance, Revolvy, https://www.revolvy.com
/topic/Electronic surveillance&item_type=topic).
Surveillance can also be used to give human operatives a tactical advantage
through improved situational awareness or through the use of automated processes,
that is, video analytics. Surveillance can help reconstruct an incident and provide
evidence through the availability of footage for forensics experts. Surveillance can
also influence subjective security if surveillance resources are visible or if the con-
sequences of surveillance can be felt.
Some of the surveillance systems (such as the camera system that has its feed
run through a facial recognition system mentioned above) can also have other uses
besides countering criminal activity. For instance, it can help with retrieving run-
away children, abducted or missing adults, and mentally disabled people.
With the advent of programs such as the Total Information Awareness program
(SourceWatch, www.sourcewatch.org/index.php/Total_Information_Awareness) and
ADVISE (“US Plans Massive Data Sweep,” www.csmonitor.com), technologies such
as high-speed surveillance computers and biometrics software, and laws such as the
Communications Assistance for Law Enforcement Act (www.fcc.gov), governments
now possess an unprecedented ability to monitor the activities of their subjects.
The biggest concern of detriment is securing information that is collected of those
who are under total surveillance and educating the public as to why those under sur-
veillance are being watched for the intended purpose of identifying terrorists. This
is in opposition to those who use the same surveillance systems and mechanisms
against civilians and have the intent to remove the laws of the land.
In addition, a significant risk of private data collection stems from the fact that
this risk is too much unknown to be readily assessed today. Storage is cheap enough
to have data stored forever, and the models using which it will be analyzed in a
decade from now cannot reasonably be foreseen.
Crisis management is the process by which an organization deals with a major event
that threatens to harm the organization, its stakeholders, or the general public. The
study of crisis management originated with the large-scale industrial and environ-
mental disasters in the 1980s. It is considered to be the most important process in
public relations.
Three elements are common to a crisis:
INTRODUCTION
Crisis management is a situation-based management system that includes clear roles
and responsibilities and process-related organizational requirements company-wide.
The response shall include action in the following areas: crisis prevention, crisis
assessment, crisis handling, and crisis termination. The aim of crisis management
is to be well prepared for crisis, ensure a rapid and adequate response to the crisis,
maintaining clear lines of reporting and communication in the event of crisis and
agreeing rules for crisis termination.
The techniques of crisis management include a number of consequent steps from
the understanding of the influence of the crisis on the corporation to preventing,
alleviating, and overcoming the different types of crisis.
Crisis management consists of different aspects, including the following:
95
96 Handbook of Emergency Management Concepts
TYPES OF CRISIS
During the crisis management process, it is important to identify the types of crisis
in that different crises necessitate the use of different crisis management strategies.
Potential crises are enormous, but crises can be clustered.
The categorized eight types of crises are as follows:
1. Natural disaster
2. Technological crises
3. Confrontation
4. Malevolence
5. Organizational misdeeds
6. Workplace violence
7. Rumors
8. Terrorist attacks/manmade disasters
Natural Disaster
Natural-disaster-related crises, typically natural disasters, are such environmental
phenomena as earthquakes, volcanic eruptions, tornadoes and hurricanes, floods,
landslides, tsunamis, storms, and droughts that threaten life, property, and the envi-
ronment itself.
Crisis Management 97
Technological Crisis
Technological crises are caused by human application of science and technology.
Technological accidents inevitably occur when technology becomes complex and
coupled and something goes wrong in the system as a whole (technological break-
downs). Some technological crises occur when human error causes disruptions
(human breakdowns). People tend to assign blame for a technological disaster
because technology is subject to human manipulation, whereas they do not hold any-
one responsible for natural disaster. When an accident creates significant environ-
mental damage, the crisis is categorized as mega damage. Samples include software
failures, industrial accidents, and oil spills.
Confrontation Crisis
Confrontation crises occur when discontented individuals and/or groups fight busi-
nesses, government, and various interest groups to win acceptance of their demands
and expectations. The common type of confrontation crisis is boycotts, and other
types are picketing, sit-ins, ultimatums to those in authority, blockade or occupation
of buildings, and resisting or disobeying police.
Crisis of Malevolence
An organization faces a crisis of malevolence when opponents or miscreant
individuals use criminal means or other extreme tactics for the purpose of
expressing hostility or anger toward, or seeking gain from, a company, country,
or economic system, perhaps with the aim of destabilizing or destroying it.
Examples include product tampering, kidnapping, malicious rumors, terrorism,
and espionage.
1. Precrisis
2. Acute
3. Chronic and conflict resolution
98 Handbook of Emergency Management Concepts
Crisis of Deception
Crises of deception occur when management conceals or misrepresents information
about itself and its products in its dealing with consumers and others.
Workplace Violence
Crises occur when an employee or former employee commits violence against other
employees on organizational grounds.
Rumors
False information about an organization or its products creates crises hurting the
organization’s reputation. Sample is linking the organization to radical groups or
stories that their products are contaminated.
Crisis Leadership
Alan Hilburg, a pioneer in crisis management, defines organizational crises as cat-
egorized as either acute crises or chronic crises (Crisis Management Explained by
Alan Hilburg, http://everything.explained.today/Crisis_management/). Erika Hayes
James, an organizational psychologist at the University of Virginia’s Darden Graduate
School of Business, identifies two primary types of organizational crisis. James
(2008) defines organizational crisis as “any emotionally charged situation that,
once it becomes public, invites negative stakeholder reaction and thereby has the
potential to threaten the financial well-being, reputation, or survival of the firm or
some portion thereof.”
1. Sudden crisis
2. Smoldering crises
Sudden Crisis
Sudden crises are circumstances that occur without warning and beyond an institu-
tion’s control. Consequently, sudden crises are most often situations for which the
institution and its leadership are not blamed.
Smoldering Crisis
Smoldering crises differ from sudden crises in that they begin as minor internal
issues that, due to manager’s negligence, develop to crisis status. These are situations
when leaders are blamed for the crisis and its subsequent effect on the institution in
question.
Crisis Management 99
There are five phases of crisis that require specific crisis leadership competencies.
Each phase contains an obstacle that a leader must overcome to improve the structure
and operations of an organization. The leadership competencies of integrity, positive
intent, capability, mutual respect, and transparency impact the trust-building process.
1. Signal detection
2. Preparation and prevention
3. Containment and damage control
4. Business recovery
5. Learning
SIGNAL DETECTION
Sense making represents an attempt to create order and make sense, retrospectively,
of what occurs. Perspective taking is the ability to consider another person’s or
group’s point of view.
It is during this stage that crisis handlers begin preparing for or averting the crisis that had
been foreshadowed in the signal detection stage. Using an impact/probability model allows
organizations to fairly accurately predict crisis scenarios. It is recognized that the greatest
organizational challenge is “speaking truth to power” to predict truly worst-case scenarios
(“The Origin of the Phrase ‘Speaking Truth to Power,’” http://classroom.synonym.com
/origin-phrase-speaking-truth-power-11676.html). Organizations such as the Red Cross’s
primary mission is to prepare for and prevent the escalation of crisis events. Walmart has
been described as an emergency-relief standard bearer after having witnessed the incred-
ibly speedy and well-coordinated effort to get supplies to the Gulf Coast of the United
States in anticipation of Hurricane Katrina (https://corporate.walmart.com/_news_/news
-archive/2005/09/04/media-information-wal-marts-response-to-hurricane-katrina).
BUSINESS RECOVERY
When crisis hits, organizations must be able to carry on with their business in the
midst of the crisis while simultaneously planning for how they will recover from
the damage the crisis caused. Crisis handlers not only engage in continuity plan-
ning (determining the people, financial, and technology resources needed to keep the
organization running) but will also actively pursue organizational resilience.
100 Handbook of Emergency Management Concepts
LEARNING
In the wake of a crisis, organizational decision makers adopt a learning orienta-
tion and use prior experience to develop new routines and behaviors that ultimately
change the way the organization operates. The best leaders recognize this and are
purposeful and skillful in finding the learning opportunities inherent in every crisis
situation.
CRISIS COMMUNICATION
This is the effort taken by an organization to communicate with the public and stake-
holders when an unexpected event occurs that could have a negative impact on the
organization’s reputation. This can also refer to the efforts to inform employees or
the public of a potential hazard that could have a catastrophic impact.
There are three essential steps that an organization can take to prepare for and
withstand a communications crisis:
Contingency Planning
Preparing contingency plans in advance, as part of a crisis-management plan, is
the first step to ensuring that an organization is appropriately prepared for a crisis.
Crisis-management teams can rehearse a crisis plan by developing a simulated sce-
nario to use as a drill. The plan should clearly stipulate that the only people to speak
to publicly about the crisis are the designated persons, such as the company spokes-
person or crisis team members. Ideally, it should be one spokesperson who can be
available on call at any time. Cooperation with the media is crucial in crisis situation,
and assure that all questions are answered on time and information on what was done
to resolve the situation is provided.
The first hours after a crisis breaks are the most crucial, so working with speed
and efficiency is important, and the plan should indicate how quickly each function
should be performed. When preparing to offer a statement externally as well as inter-
nally, information should be accurate and transparent.
Providing incorrect or manipulated information has a tendency to backfire and
will greatly exacerbate the situation. The contingency plan should contain informa-
tion and guidance that will help decision makers to consider not only the short-term
consequences but also the long-term effects of every decision.
1. An innovation
2. An individual or other unit of adoption that has knowledge of or experience
with using the innovation
3. Another individual or other unit that does not yet have knowledge of the
innovation
4. A communication channel connecting the two units. A communication
channel is the means by which messages get from one individual to another.
CRISIS LEADERSHIP
The five leadership competencies that facilitate organizational restructuring during
and after a crisis are the following:
Crisis leadership research concludes that leadership action in crisis reflects the
competency of an organization, because the test of crisis demonstrates how well
the institution’s leadership structure serves the organization’s goals and withstands
crisis. Developing effective human resources is vital when building organizational
capabilities through crisis management executive leadership.
105
106 Handbook of Emergency Management Concepts
Law
enforcement
t
en
em
Threat
ag
an assessment and
Co
consultation
sm
ns
isi
eq
Cr
ue
nc
WMD
ema
technical support
na
g
em
en
t
Follow-on assets to support the response
to consequences on lives and property
Planning tools:
Media/legal Command
DEST
component group
Hazardous
Technical Logistics Communications HHS EPA
materials
component component component component component
response unit
Other FRP
agencies
as requested
FIGURE 5.2 ICS chart. DOD, Department of Defense; DOE, Department of Energy; EM,
emergency management; EPA, Environmental Protection Agency; FBI, Federal Bureau of
Investigation; FEMA, Federal Emergency Management Agency; FRP, Federal Response Plan;
HHS, Human & Health Services; ICS, Incident Command System.
Recovery tools:
The above components combine to form a solution that provides hazard vulnera-
bility and emergency readiness assessments for any type of emergency (an all-hazard
approach) followed by response plans jointly developed by government and industry
(mutual aid) and improved alert dissemination and communication leading to coor-
dinated medical response and overall incident command and control, with a focus
on improving the preparedness and response efforts of first responders (firefight-
ers, policemen, and emergency medical technicians) and local emergency manag-
ers (trained incident commanders who typically manage the emergency operations
108 Handbook of Emergency Management Concepts
center (EOC) that resides in each community). The solution is completed with
components for recovery/remediation, including the management of volunteers and
assets from lending organizations.
The need for a complete consequence management solution to better prepare for
and respond to natural and manmade emergencies is clear. There are numerous and
meaningful, measurable benefits to improving command, control, communication,
coordination, and recovery within each community for all-hazard emergency situa-
tions, the number one benefit being the saving of lives.
SOFTWARE
Several different software automation tools are available to support the planning,
coordination and response of local governments and private sector organizations to
potential emergencies.
These solutions include the latest in event prediction, community-wide physi-
cal and human resource identification and management, automation of contingency
plans, awareness of emergency situations via geomapping, real-time interagency
communication, and overall incident response task workflow and management.
Consequence management technologies serve to help our communities establish
control over their resources, effectively plan for emergency situations, and improve
the appropriate response to an event, thereby mitigating risk and saving lives.
So what overall functionality should a true consequence management solution
provide (Figure 5.3)?
The greatest benefit to local communities will be in the adoption of solutions that
can facilitate the overall incident response to any natural or manmade hazard. These
consequence management solutions will provide numerous, quantifiable benefits for
U.S. communities and their corporate citizens by mitigating the risks associated with
emergency situations, better preparing the community and private sector organiza-
tions for these events, vastly improving the response to natural and manmade inci-
dents and facilitating a smooth recovery from the event.
The need for leadership, expertise, and resources in identifying and responding to
both natural and manmade threats has become more clearly understood in the after-
math of 9/11 and the recent hurricane season. The next task for every community is to
define the distinct roles of first responders, the medical community, public health pro-
fessionals, and all other participants in a community-based response system; get them
to focus on interagency collaboration; cross-train them on emergency management
principles and the Incident Command System (ICS); and to define emergency response
plans based on an all-hazard approach—and to do so before the next event occurs.
Natural disasters and terrorism do not respect geographic boundaries, and we
now know that each and every community in this nation is vulnerable to a natural or
112 Handbook of Emergency Management Concepts
Likelihood Consequence
management management
C
O
N
H S
A E
Z Q
A Risk
event U
R E
D N
S C
E
S
Examples of where we correctly Examples of where we correctly
focus on likelihood management: focus on consequence management:
• Brushing our teeth • Earthquakes
• Anti-lock brakes in cars • Bushfires
Some areas where risk management Some areas where risk management
might improve by diverting resources might improve by diverting resources
to consequence management: to likelihood management:
• Climate change • Diabetes
• Snakebite • Global financial crises
manmade disaster. We may not be able to prevent these incidents, but we can mini-
mize the effects of these emergencies, both on an economic and human scale, with
the adoption of technologies that provide consequence management solutions, and
with a focus on interagency collaboration (Figure 5.4).
COORDINATING RESPONSE
Information sharing and interagency coordination are clearly needed to facilitate a
successful emergency incident response. Yet many public and private organizations
lack the comprehensive emergency response plans that define the roles and responsi-
bilities of trained personnel responding to an unexpected incident and describe how
to work “side by side” with responders from other agencies.
Training itself is an issue, as many organizations do not know where to turn for
assistance regarding emergency preparedness, nor do they have the time to stop the
daily task of operating a business or service to educate personnel on how to respond
to disasters or to implement the emergency preparedness and response requirements
now mandated by the federal government.
In the local communities, where such training is mandated, agencies participat-
ing in an emergency response are often not coordinated in their efforts, and, to make
matters worse, severe shortages exist in the area of emergency management person-
nel. The preparedness and response expertise reflected in this type of human capital
is in great demand post-9/11, but very hard to find.
Clearly, the response to a bioterrorism incident would be improved with better
collaboration and coordination among the agencies and private companies par-
ticipating in this response effort. How is this accomplished? With training on the
principles of emergency management and the ICS established by FEMA for use in
Consequence Management 113
response to any type of hazard (an all-hazard approach) and the implementation of
“inherently safer technologies for improved incident response,” advocated by the
Department of Homeland Security.
The all-hazard approach has been a cornerstone of FEMA’s response program
since the agency was first established. It integrates the various emergency plans and
activities into a “life cycle” of mitigation, preparedness, response, and recovery (the
principles of emergency management) and, when combined with the ICS, provides a
template for interagency coordination that is directly applicable to events stemming
from chemical and biological hazards, as well as all other manmade or natural events.
Every community with an EOC has “in-house” expertise on the all-hazard approach,
which should be utilized to assist other agencies (such as public health) in the assess-
ment, planning, and simulation of a community-based response to emergency situations.
Each and every year, cities across the nation demonstrate that collaboration
between agencies, using the all-hazard approach to fully prepare the communities
for a coordinated incident response. This example refers to communities that are
within a 10-mile radius of a nuclear power facility, where radiological emergency
preparedness exercises are performed.
Horizontal communication and rapid exchange of information among agencies
are a basic requirement during any emergency, and the all-hazard approach has
proven to be a successful response system for both natural and manmade events.
Each community should leverage their experience and knowledge of the all-hazard
response system and ensure that all agencies participating in an emergency incident
response are cross-trained in this approach.
Summarizing about what “consequence management” is, it was introduced into
the national security lexicon with the promulgation of PDD 39 in 1995. This PDD’s
purpose was to establish how the nation would respond to terrorism employing weap-
ons of mass destruction (WMD) and how the consequences of such an incident would
be managed. Despite the very broad outlines of the PDD, consequence management,
for the most part, continues to be a tabula rasa. It has never been done before. There
are not yet any experts. The concept of “consequence management” will remain
ill-defined as well-intentioned organizations and individuals grapple with how they
might institutionalize a comprehensive operational response to a terrorist’s use of
WMD. Make no mistake, though, consequence management is not only a character-
istic of the post-Cold War, it is also an indicator of just how capable this nation is of
reconceptualizing and reorganizing for its security in the 21st century.
http://taylorandfrancis.com
6 Risk Management
115
116 Handbook of Emergency Management Concepts
In practice, the process of assessing overall risk can be difficult, and balancing
resources used to mitigate between risks with a high probability of occurrence but
lower loss versus a risk with high loss but lower probability of occurrence can often
be mishandled.
Intangible risk management identifies a new type of a risk that has a 100% probability
of occurring but is ignored by the organization due to a lack of identification ability.
For example, when deficient knowledge is applied to a situation, a knowledge risk
materializes. Relationship risk appears when ineffective collaboration occurs. Process-
engagement risk may be an issue when ineffective operational procedures are applied.
These risks directly reduce the productivity of knowledge workers and decrease cost-
effectiveness, profitability, service, quality, reputation, brand value, and earnings qual-
ity. Intangible risk management allows risk management to create immediate value
from the identification and reduction of risks that reduce productivity.
Risk management also faces difficulties in allocating resources. This is the idea of
opportunity cost. Resources spent on risk management could have been spent on more
profitable activities. Again, ideal risk management minimizes spending (or manpower or
other resources) and also minimizes the negative effects of risks.
According to the definition of risk, the risk is the possibility that an event will
occur and adversely affect the achievement of an objective. Therefore, risk itself
has uncertainty. Risk management such as Committee of Sponsoring Organizations
(COSO) Enterprise Risk Management (ERM)–Integrated Framework can help man-
agers have a good control for their risk.
Each company may have different internal control components, which leads to different
outcomes. For example, the framework for enterprise risk management components
includes Internal Environment, Objective Setting, Event Identification, Risk Assessment,
Risk Response, Control Activities, Information and Communication, and Monitoring.
METHOD
For the most part, these methods consist of the following elements, performed, more
or less, in the following order.
PROCESS
According to the standard ISO 31000 “Risk management—Principles and guide-
lines on implementation,” the process of risk management consists of several steps
as follows (www.iso.org).
Identification
After establishing the context, the next step in the process of managing risk is to
identify potential risks. Risks are about events that, when triggered, cause problems
or benefits. Hence, risk identification can start with the source of our problems and
those of our competitors (benefit), or with the problem itself.
When either source or problem is known, the events that a source may trigger or
the events that can lead to a problem can be investigated. For example: stakeholders
withdrawing during a project may endanger funding of the project; confidential infor-
mation may be stolen by employees even within a closed network; lightning striking
an aircraft during takeoff may make all people on board immediate casualties.
The chosen method of identifying risks may depend on culture, industry practice,
and compliance. The identification methods are formed by templates or the develop-
ment of templates for identifying source, problem, or event. Common risk identifica-
tion methods are as follows:
Assessment
Once risks have been identified, they must then be assessed as to their potential
severity of impact (generally a negative impact, such as damage or loss) and to the
probability of occurrence. These quantities can be either simple to measure, in the
case of the value of a lost building, or impossible to know for sure in the case of an
unlikely event, the probability of occurrence of which is unknown. Therefore, in
the assessment process, it is critical to make the best educated decisions in order
to properly prioritize the implementation of the risk management plan.
Risk Management 119
assessment is then low, medium, or high, depending on the subrange containing the
calculated value of the Composite Index.
Likewise, the impact of the risk is not easy to estimate since it is often difficult to
estimate the potential loss in the event of risk occurrence.
Further, both the above factors can change in magnitude depending on the ade-
quacy of risk avoidance and prevention measures taken and due to changes in the
external business environment. Hence, it is absolutely necessary to periodically reas-
sess risks and intensify/relax mitigation measures, or as necessary. Changes in pro-
cedures, technology, schedules, budgets, market conditions, political environment,
or other factors typically require reassessment of risks.
Risk Options
Risk mitigation measures are usually formulated according to one or more of the
following major risk options:
• Design a new business process with adequate built-in risk control and con-
tainment measures from the start.
• Periodically reassess risks that are accepted in ongoing processes as a nor-
mal feature of business operations and modify mitigation measures.
• Transfer risks to an external agency (e.g., an insurance company).
• Avoid risks altogether (e.g., by closing down a particular high-risk business
area).
Later research has shown that the financial benefits of risk management are less
dependent on the formula used but are more dependent on the frequency and how
risk assessment is performed.
Ideal use of these risk control strategies may not be possible. Some of them may
involve trade-offs that are not acceptable to the organization or person making the
risk management decisions.
Risk Avoidance
This includes not performing an activity that could carry risk. An example would
be not buying a property or business in order to not take on the legal liability that
Risk Management 121
comes with it. Another would be not flying in order not to take the risk that the
airplane were to be hijacked. Avoidance may seem the answer to all risks, but
avoiding risks also means losing out on the potential gain that accepting (retain-
ing) the risk may have allowed. Not entering a business to avoid the risk of loss
also avoids the possibility of earning profits. Increasing risk regulation in hospi-
tals has led to avoidance of treating higher risk conditions, in favor of patients
presenting with lower risk (Risk Management—Bolds Risk, https://boldrisk.com
/risk-management).
Hazard Prevention
Hazard prevention refers to the prevention of risks in an emergency. The first
and most effective stage of hazard prevention is the elimination of hazards. If
this takes too long, is too costly, or is otherwise impractical, the second stage is
mitigation.
Risk Reduction
Risk reduction or “optimization” involves reducing the severity of the loss or the
likelihood of the loss from occurring. For example, sprinklers are designed to put
out a fire to reduce the risk of loss by fire. Acknowledging that risks can be positive
or negative, optimizing risks means finding a balance between negative risk and the
benefit of the operation or activity and between risk reduction and effort applied.
Outsourcing could be an example of risk reduction if the outsourcer can demonstrate
higher capability at managing or reducing risks.
Risk Sharing
Briefly defined as “sharing with another party the burden of loss or the benefit of
gain, from a risk, and the measures to reduce a risk” (Aujero, 2014).
The term of “risk transfer” is often used in place of risk sharing in the mistaken
belief that you can transfer a risk to a third party through insurance or outsourcing.
In practice, if the insurance company or contractor go bankrupt or end up in court,
the original risk is likely to still revert to the first party. As such, in the terminology
of practitioners and scholars alike, the purchase of an insurance contract is often
described as a “transfer of risk.” However, technically speaking, the buyer of the
contract generally retains legal responsibility for the losses “transferred,” mean-
ing that insurance may be described more accurately as a postevent compensatory
mechanism. For example, a personal injuries insurance policy does not transfer the
risk of a car accident to the insurance company. The risk still lies with the policy
holder, namely, the person who has been in the accident. The insurance policy simply
provides that if an accident (the event) occurs involving the policy holder, then some
compensation may be payable to the policy holder that is commensurate with the
suffering/damage.
Some ways of managing risk fall into multiple categories. Risk retention pools
are technically retaining the risk for the group, but spreading it over the whole group
122 Handbook of Emergency Management Concepts
involves transfer among individual members of the group. This is different from tra-
ditional insurance, in that no premium is exchanged between members of the group
up front, but instead losses are assessed in all members of the group.
Risk Retention
Risk retention involves accepting the loss, or benefit of gain, from a risk when it
occurs. True self-insurance falls in this category. Risk retention is a viable strategy
for small risks where the cost of insuring against the risk would be greater over
time than the total losses sustained. All risks that are not avoided or transferred are
retained by default.
This includes risks that are so large or catastrophic that they either cannot be
insured against or the premiums would be infeasible. War is an example since
most property and risks are not insured against war, so the loss attributed by war is
retained by the insured.
Also any amounts of potential loss (risk) over the amount insured are retained
risk. This may also be acceptable if the chance of a very large loss is small or if
the cost to insure for greater coverage amounts is so great it would hinder the goals
of the organization too much. Risk retention or acceptance is common type of risk
response on treats and opportunities.
IMPLEMENTATION
Implementation follows all of the planned methods for mitigating the effect of the
risks. Purchase insurance policies for the risks that have been decided to be trans-
ferred to an insurer, avoid all risks that can be avoided without sacrificing the entity’s
goals, reduce others, and retain the rest.
Risk Management 123
1. To evaluate whether the previously selected security controls are still appli-
cable and effective.
2. To evaluate the possible risk level changes in the business environment. For
example, information risks are a good example of rapidly changing busi-
ness environment.
Limitations
Prioritizing the risk management processes too highly could keep an organization
from ever completing a project or even getting started. This is especially true if other
work is suspended until the risk management process is considered complete.
It is also important to keep in mind the distinction between risk and uncertainty.
Risk can be measured by impacts × probability.
If risks are improperly assessed and prioritized, time can be wasted in dealing
with risk of losses that are not likely to occur. Spending too much time assessing
and managing unlikely risks can divert resources that could be used more profit-
ably. Unlikely events do occur, but if the risk is unlikely enough to occur, it may be
better to simply retain the risk and deal with the result if the loss does in fact occur.
Qualitative risk assessment is subjective and lacks consistency. The primary justifi-
cation for a formal risk assessment process is legal and bureaucratic.
Hazard Analysis
A hazard analysis is used as the first step in a process used to assess risk. The result
of a hazard analysis is the identification of different type of hazards. A hazard is
a potential condition and exists or not (probability is 1 or 0). It may in single exis-
tence or in combination with other hazards (sometimes called events) and conditions
become an actual functional failure or accident (mishap). The way this exactly hap-
pens in one particular sequence is called a scenario.
This scenario has a probability (between 1 and 0) of occurrence. Often, a system
has many potential failure scenarios. It also is assigned a classification, based on the
worst case severity of the end condition. Risk is the combination of probability and
severity. Preliminary risk levels can be provided in the hazard analysis.
The validation, more precise prediction (verification), and acceptance of risk are
determined in the risk assessment (analysis). The main goal of both is to provide the
best selection of means of controlling or eliminating the risk. The term is used in
several engineering specialties, including avionics, chemical process safety, safety
engineering, reliability engineering, and food safety.
124 Handbook of Emergency Management Concepts
Severity Definition
Catastrophic Results in multiple fatalities and/or loss of the system
Hazardous Reduces the capability of the system or the operator ability to cope with adverse
conditions to the extent that there would be
• Large reduction in safety margin or functional capability
• Crew physical distress/excessive workload such that operators cannot be relied
upon to perform required tasks accurately or completely
• Serious or fatal injury to small number of occupants of aircraft (except
operators)
• Fatal injury to ground personnel and/or general public
(Continued)
Major Reduces the capability of the system or the operators to cope with adverse operating
conditions to the extent that there would be
• Significant reduction in safety margin or functional capability
• Significant increase in operator workload
• Conditions impairing operator efficiency or creating significant discomfort
• Physical distress to occupants of an aircraft (except operator), including
injuries
• Major occupational illness and/or major environmental damage, and/or major
property damage
Minor Does not significantly reduce system safety. Actions required by operators are well
within their capabilities. Include
• Slight reduction in safety margin or functional capabilities
• Slight increase in workload, such as routine flight plan changes
• Some physical discomfort to occupants or aircraft (except operators)
• Minor occupational illness and/or minor environmental damage and/or minor
property damage
No safety effect Has no effect on safety
LIKELIHOOD OF OCCURRENCE
Likelihood Definition
Probable • Qualitative: Anticipated to occur one or more times during the entire system
of the operational life of an item.
• Quantitative: Probability of occurrence per operational hour is greater than
1 × 105 {\displaystyle 1\times 10^{5}}
Remote • Qualitative: Unlikely to occur to each item during its total life. May occur
several times in the life of an entire system or fleet.
• Quantitative: Probability of occurrence per operational hour is less than the
1 × 105 {\displaystyle 1\times 10^{greater occurrence. 1 × 107
{\displaystyle 1\times 10^{7}}
Extremely remote • Qualitative: not anticipated to occur to each item during its total life. May
occur a few times in the life of an entire system or fleet.
• Quantitative: probability of occurrence per operational hour is less than the
1 × 107 {\displaystyle 1\times 10^{greater than occurrence. 1 × 109
{\displaystyle 1\times 10^{9}}
Extremely • Qualitative: so unlikely that it is not anticipated to occur during the entire
improbable operational life of an entire system or fleet.
• Quantitative: probability of occurrence per operational hour is less than
occurrence. 1 × 109 {\displaystyle 1\times 10^{9}}
Again, hazard analysis is used as the first step in a process used to assess risk.
The result of a hazard analysis is the identification of different type of hazards.
A hazard is a potential condition and exists or not (probability is 1 or 0). It may be in
single existence or in combination with other hazards (sometimes called events) and
conditions become an actual functional failure or accident (mishap).
http://taylorandfrancis.com
7 Composite Risk
Management Process
The U.S. Army uses this process to lessen the impact of risk and threat on its opera-
tions, and I believe this process would be a valuable tool in the emergency manage-
ment planning process.
The composite risk management (CRM) process is a process for decision making
developed by the U.S. military to acknowledge, assess, and address hazards and control
risks—during missions, operations, and even day-to-day activities (U.S. Army, 2010).
1.
Time critical: Used when there is little time, little complexity, or low risk.
Often used during the execution phase of an operation where an unplanned
change occurs and must be managed. It’s easily applied to any situations.
2.
Deliberate: Used in the majority of workplace applications where experi-
ence in a group setting will produce the best results.
3.
Strategic: Used in high-priority or high-visibility situations, strategic CRM
generally requires use of more thorough hazard identification and risk
assessment tools. It is generally reserved for the more complex and riskier
efforts, as it may be time-consuming.
127
128 Handbook of Emergency Management Concepts
CRM PRINCIPLES
CRM has four key principles that govern its application. These underlying princi-
ples should be considered before, during, and after every application of the five-step
process.
Catastrophic I E E H H M
Critical II E H H M L
Marginal III H M M L L
Negligible IV M L L L L
Remember that the risk assessment matrix doesn’t directly consider exposure lev-
els. You must factor any exposure considerations into the judgment of severity and
probability. For example, a normally seldom occurrence of equipment failure may
be increased to occasional if the exposure rate is high, thus making the overall risk
level medium.
COMPONENTS OF RISK
Exposure
Exposure is the first action in assessing risk. Remember that exposure is the number
of resources (personnel or equipment) affected by a given event or by repeated events
over time. Exposure can be expressed in the following terms:
Severity
The severity assessment should be based on the worst possible outcome that can
be expected. It’s expressed in terms of the impact on mission, people, material,
facilities, and environment. Rank hazard severity using the following standard
categories:
Probability
Next, estimate the probability of the hazard. Probability tells you how often the haz-
ard will affect some operation within the mission. If you have reliable data available,
you can also express probability as a number, in terms of a ratio or as a percentage.
Express the level of probability by using the following ranking levels.
Keep in mind the cumulative probability of the causes listed for the hazard. For
example, if there are four causes for a single hazard, the probability of its occurrence
130 Handbook of Emergency Management Concepts
will be greater than if there were only one cause. For future reference, document
your supporting rationale for assigning a probability to each hazard.
Figure 7.1 presents a simple chart to assist one in the CRM process. This chart can
be made up of whatever means one needs that may apply to one risk and threat, kind
of fill in the blanks to be adaptable to one’s needs.
8 Hazards (Risk)
HAZARD TYPES
Biological hazards are associated with food, including certain viruses, parasites,
fungi, bacteria, and plant and seafood toxins. Pathogenic Campylobacter and
Salmonella are common food-borne biological hazards. The hazards from these
bacteria can be avoided through risk mitigation steps such as proper handling, stor-
ing, and cooking of food. Disease in humans can come from biological hazards
in the form of infection by bacteria, antigens, viruses, or parasite. There is some
concern that new technologies such as genetic engineering pose biological hazards.
Genetically modified (GM) organisms are relatively new manmade biological haz-
ards and many have yet to be fully characterized.
Chemicals can be considered a hazard if, by virtue of its intrinsic properties, it
can cause harm or danger to humans, property, or the environment.
Some harmful chemicals occur naturally in certain geological formations, such
as radon gas or arsenic. Other chemicals include products with commercial uses,
such as agricultural and industrial chemicals, as well as products developed for home
use. Pesticides, which are normally used to control unwanted insects and plants, may
cause a variety of negative effects on nontarget organisms.
Dichloro-diphenyl-trichloroethane (DDT) can build up, or bioaccumulate, in birds,
resulting in thinner-than-normal egg shells, which can break in the nest. The organo
chlorine pesticide dieldrin has been linked to Parkinson’s disease. Corrosive chemi-
cals like sulfuric acid, which is found in car batteries and research laboratories,
can cause severe skin burns. Many other chemicals used in industrial and labora-
tory settings can cause respiratory, digestive, or nervous system problems if they are
inhaled, ingested, or absorbed through the skin. The negative effects of other chemi-
cals, such as alcohol and nicotine, have been well documented. Hazards associated
with chemicals are dependent on the dose or amount of the chemical.
Mechanical
A mechanical hazard is any hazard involving a machine or process. Motor vehicles,
aircraft, and air bags pose mechanical hazards. Compressed gases or liquids can also
be considered a mechanical hazard.
131
132 Handbook of Emergency Management Concepts
Physical
A physical hazard is a naturally occurring process that has the potential to create loss
or damage. Physical hazards include earthquakes, floods, and tornadoes. Physical
hazards often have both human and natural elements. Flood problems can be
affected by the natural elements of climate fluctuations and storm frequency and by
land drainage and building in a flood plain, human elements.
Another physical hazard, X-rays, naturally occurs from solar radiation but has
also been utilized by humans for medical purposes; however, overexposure can lead
to cancer, skin burns, and tissue damage.
HAZARD VS RISK
The terms “hazard” and “risk” are often used interchangeably. However, in terms of
risk assessment, these are two very distinct terms. As defined above, a hazard is any
biological, chemical, mechanical, or physical agent that is reasonably likely to cause
harm or damage to humans or the environment with sufficient exposure or dose. Risk
is defined as the probability that exposure to a hazard will lead to a negative conse-
quence or, more simply, Risk = Hazard × Dose (Exposure). Thus, a hazard poses no
risk if there is not exposure to that hazard.
HAZARD IDENTIFICATION
Mechanical and Physical Hazards
Many mechanical hazards (aircraft, motor vehicles) and physical hazards (earth-
quakes, floods) have already been identified and well described. Hazard identifica-
tion of new machines and/or industrial processes occurs at various stages in the
design of the new machine or process. These hazard identification studies focus
mainly on deviations from the intended use or design and the harm that may occur
as a result of these deviations. These studies are regulated by various agencies such
as the Occupational Safety and Health Administration and the National Highway
Traffic Safety Administration.
Biological Hazards
Many biological hazards have also been identified. For example, the hazards of natu-
rally occurring bacteria such as Escherichia coli and Salmonella are well known as
disease-causing pathogens, and a variety of measures have been taken to limit human
exposure to these microorganisms through food safety, good personal hygiene, and
education. However, the potential for new biological hazards exists through the dis-
covery of new microorganisms and through the development of new GM organisms.
Use of new GM organisms is regulated by various governmental agencies. The
US Environmental Protection Agency (EPA) controls GM plants that produce or
resist pesticides (i.e., BT corn and Roundup ready crops). The US Food and Drug
Administration (FDA) regulates GM plants that will be used as food or for medicinal
purposes.
Hazards (Risk) 133
Chemical Hazards
A variety of chemical hazards (DDT, atrazine) have been identified as well. However,
every year, companies produce more new chemicals to fill new needs or to take the
place of older, less effective chemicals. Laws, such as the Federal Food, Drug, and
Cosmetic Act and the Toxic Substances Control Act in the United States, require
protection of human health and the environment for any new chemical introduced.
In the United States, the EPA regulates new chemicals that may have environmen-
tal impacts (i.e., pesticides or chemicals released during a manufacturing process),
while the FDA regulates new chemicals used in foods or as drugs. The potential
hazards of these chemicals can be identified by performing a variety of tests prior
to the authorization of usage. The amount of tests required and the extent to which
the chemicals are tested vary, depending on the desired usage of the chemical.
Chemicals designed as new drugs must undergo more rigorous tests than those used
as pesticides.
Environmental Hazards
Natural Hazards
Natural hazard risks have threatened people, society, the natural environment, and
the built environment, particularly more vulnerable people, throughout history and,
in some cases, on a day-to-day basis. The social, natural, and built environments are
at risk not only from geophysical hazards such as earthquakes, floods, volcanoes, and
tsunami but also from manmade technological hazards, including industrial explo-
sions, release of chemical hazards, and major accident hazards. Manmade hazards
include the emergence of risks to people and the built environment in the modern
world where hazards are presented by terrorist threats and technological hazards.
According to the Red Cross (Alexander, 2014), each year, 130,000 people are killed,
90,000 are injured, and 140 million are affected by unique events known as disaster,
and the effects of the loss of life, property damage, and social and economic disrup-
tion are caused by natural disasters, such as earthquakes, wind storms, tsunamis,
floods, landslides, volcanic eruptions, wildfire, grasshopper and locust infestations,
drought, and desertification and other calamities of natural origin.
a risk and potentially those who will be involved in the emergency response. Such
impacts include death, injury, trauma, or posttraumatic stress disorder.
The definition of an environmental hazard is “the threat potential posed to man or
nature by events originating in, or transmitted by, the natural or built environment.”
Keith Smith (2001) says that this definition includes a broader range of hazards rang-
ing from long-term environmental deterioration, such as acidification of soils and
build-up of atmospheric carbon dioxide, to communal and involuntary social haz-
ards such as crime and terrorism to voluntary and personal hazards such as drug
abuse and mountain climbing.
Environmental hazards usually have defined or common characteristics, includ-
ing their tendency to be rapid-onset events, meaning they occur with a short warning
time, they have a clear source of origin which is easily identified, impact will be
swift and losses are suffered quickly during or shortly after the onset of the event,
risk of exposure is usually involuntary due to location or proximity of people to set
hazard, and the disaster occurs with an intensity and scale that justify an emergency
response.
Hazards were grouped by Christopher and Burton (2001) according to their char-
acteristics. These were factors related to geophysical events which were not process
specific (Smith, 2001). They were the following:
Disaster can take various forms, including hurricane, volcano, tsunami, earth-
quake, drought, famine, plague, disease, rail crash, car crash, tornado, deforestation,
flooding, toxic release, and spills.
These can affect people and the environment on the local regional level, national
level, or international level, where the international community becomes involved
with aid donation and governments give money to support affected countries’ econo-
mies with disaster response and reconstruction postdisaster.
In defining hazard, it is important to distinguish between natural hazards, which
may be defined as extreme events that originate in the biosphere, hydrosphere, lith-
osphere or atmosphere and a potential threat to humans and their welfare, which
include earthquakes, landslides, hurricanes, and tsunamis, and technological haz-
ards, including explosions, release of toxic materials, episodes of severe contami-
nation, structural collapses, and transportation, construction and manufacturing
accidents, etc. There is also a distinction to be made between rapid-onset natural
hazards, technological hazards, and social hazards and the consequences of environ-
mental degradation such as desertification and drought, which are described as being
of sudden occurrence and relatively short duration. The distinction between hazard
and risk are defined as the hazard will cause harm or damage and the chance of the
hazard happening is not mitigated. Risk has the additional implication of the chance
of a particular hazard actually occurring and thus define risk as the probability of
Hazards (Risk) 135
RISK
Risk can be defined as the likelihood or probability of a given hazard of a given level
causing a particular level of loss of damage. The elements of risk to the populations
and communities come from the built-up environment, the natural environment, and
economic activities and services which are under threat of disaster in any given area.
Risk can be equated with a simple equation, although it is not mathematical. The
total risk according to UNDRO (1982) is the “sum of predictable deaths, injuries,
destruction, damage, disruption, and costs of repair and mitigation caused by a disas-
ter of a particular level in a given area or areas.” Mathematically, it can be written as
An example of the numerical ratings for each of the four criteria is shown in the
following:
Elimination
Substitution
Engineering controls
Administrative controls
• Elimination
• Substitution
• Engineering
• Administration
• Personal protective equipment (PPE)
Elimination
Eliminating the hazard—physically removing it is the most effective hazard control.
For example, if employees must work high above the ground, the hazard can be
Best Best
Elimination
Design it out
Substitution
Use something else
Engineering controls
Isolation and guarding
Administrative controls
Training and work scheduling
Personal protective equipment
Control Last resort Business
effectiveness value
eliminated by moving the piece they are working on to ground level to eliminate the
need to work at heights.
Substitution
This pesticide contains DDT, and an effective substitution would be to replace it with
a environmentally friendly. Substitution, the second most effective hazard control,
involves replacing something that produces a hazard (similar to elimination) with
something that does not produce a hazard—for example, replacing lead-based paint
with acrylic paint. To be an effective control, the new product must not produce
another hazard. Because airborne dust can be hazardous, if a product can be pur-
chased with a larger particle size, the smaller product may effectively be substituted
with the larger product.
Engineering Controls
The third most effective means of controlling hazards is engineered controls. These
do not eliminate hazards, but rather isolate people from hazards. Capital costs of
engineered controls tend to be higher than less effective controls in the hierarchy;
however, they may reduce future costs. For example, a crew might build a work plat-
form rather than purchase, replace, and maintain fall arrest equipment. “Enclosure
and isolation” create a physical barrier between personnel and hazards, such as using
remotely controlled equipment. Fume hoods can remove airborne contaminants as a
means of engineered control.
Administrative Controls
Administrative controls are changes to the way people work. Examples of admin-
istrative controls include procedure changes, employee training, and installation of
signs and warning labels (such as those in the Workplace Hazardous Materials
Information System [WHMIS], https://www.canada.ca/en/health-canada/services
/environmental).
Administrative controls do not remove hazards, but limit or prevent people’s
exposure to the hazards, such as completing road construction at night when fewer
people are driving.
Vulnerability refers to the inability (of a system or a unit) to withstand the effects
of a hostile environment. A window of vulnerability is a time frame within which
defensive measures are diminished, compromised, or lacking.
COMMON APPLICATIONS
In relation to hazards and disasters, vulnerability is a concept that links the rela-
tionship that people have with their environment to social forces and institutions
and the cultural values that sustain and contest them. “The concept of vulnerability
expresses the multi dimensionality of disasters by focusing attention on the totality
of relationships in a given social situation which constitute a condition that, in com-
bination with environmental forces, produces a disaster” (Bankoff, 2004).
It’s also the extent to which changes could harm a system, or to which the com-
munity can be affected by the impact of a hazard or exposed to the possibility of
being attacked or harmed, either physically or emotionally: “we were in a vulnerable
position.”
Research
Within the body of literature related to vulnerability, major research streams include
questions of methodology, such as measuring and assessing vulnerability, including
finding appropriate indicators for various aspects of vulnerability, up and down scal-
ing methods, and participatory methods.
Vulnerability research covers a complex, multidisciplinary field including develop-
ment and poverty studies, public health, climate studies, security studies, engineering,
geography, political ecology, and disaster risk management. This research is of impor-
tance and interest for organizations trying to reduce vulnerability—especially as related
to poverty and other Millennium Development Goals. Many institutions are conduct-
ing interdisciplinary research on vulnerability. A forum that brings many of the cur-
rent researchers on vulnerability together is the Expert Working Group (Biometric
Vulnerability Assessment Expert Group, https://www.biometricsinstitute.org/biometric
-vulnerability). Researchers are currently working to refine definitions of “vulnerability,”
measurement and assessment methods, and effective communication of research to deci-
sion makers.
TYPES OF VULNERABILITIES
Social Vulnerability
In its sense, social vulnerability is one dimension of vulnerability to multiple stress-
ors (agent responsible for stress) and shocks, including abuse, social exclusion, and
139
140 Handbook of Emergency Management Concepts
Cognitive Vulnerability
A cognitive vulnerability, in cognitive psychology, is an erroneous belief, cognitive
bias, or pattern of thought that is believed to predispose the individual to psychologi-
cal problems.
It is in place before the symptoms of psychological disorders start to appear, such
as high neuroticism, and after the individual encounters a stressful experience, the
cognitive vulnerability shapes a maladaptive response that may lead to a psycho-
logical disorder. In psychopathology, cognitive vulnerability is constructed from
schema models, hopelessness models, and attachment theory. Attentional bias is
one mechanism leading to faulty cognitive bias that leads to cognitive vulnerabil-
ity. Allocating a danger level to a threat depends on the urgency or intensity of the
threshold. Anxiety is not associated with selective orientation.
Military
In military terminology, vulnerability is a subset of survivability, the others being sus-
ceptibility and recoverability. Vulnerability is defined in various ways depending on
the nation and service arm concerned, but in general, it refers to the near-instantaneous
effects of a weapon attack. In aviation, it is defined as the inability of an aircraft to
withstand the damage caused by the manmade hostile environment. In some defini-
tions, recoverability (damage control, firefighting, restoration of capability) is included
in vulnerability. Some military services develop their own concept of vulnerability.
Invulnerability
Invulnerability is a common feature found in video games. It makes the player impervi-
ous to pain, damage, or loss of health. It can be found in the form of “power-ups” or
cheats; when activated via cheats, it is often referred to as “god mode.” Generally, it does
not protect the player from certain instant-death hazards, most notably “bottomless” pits
from which, even if the player were to survive the fall, they would be unable to escape.
As a rule, invulnerability granted by power-ups is temporary and wears off after
a set amount of time, while invulnerability cheats, once activated, remain in effect
until deactivated, or the end of the level is reached. Depending on the game in ques-
tion, invulnerability to damage may or may not protect the player from nondamage
effects, such as being immobilized or sent flying.
VULNERABILITY ASSESSMENT
A vulnerability assessment is the process of identifying, quantifying, and priori-
tizing (or ranking) the vulnerabilities in a system. Examples of systems for which
Vulnerability 141
vulnerability assessments are performed include, but are not limited to, information
technology (IT) systems, energy supply systems, water supply systems, transporta-
tion systems, and communication systems.
Such assessments may be conducted on behalf of a range of different organiza-
tions, from small businesses up to large regional infrastructures. Vulnerability from
the perspective of disaster management means assessing the threats from potential
hazards to the population and to infrastructure. It may be conducted in the political,
social, economic, or environmental fields.
Vulnerability assessment has many things in common with risk assessment.
Assessments are typically performed according to the following steps:
VULNERABILITY INDEX
A vulnerability index is a measure of the exposure of a population to some haz-
ard. Typically, the index is a composite of multiple quantitative indicators that, via
142 Handbook of Emergency Management Concepts
some formula, delivers a single numerical result. Through such an index, “diverse
issues can be combined into a standardized framework…making comparisons pos-
sible” (SIDS of the Pacific, 2015). For instance, indicators from the physical sciences
can be combined with social, medical, and even psychological variables to evaluate
potential complications for disaster planning.
The origin of vulnerability indexes as a policy planning tool began with the United
Nations Environmental Program. One of the participants in the early task forces has
also conducted secondary research documenting the evolution of the analytic tool
through various stages (United Nations Environment Programme, www.unep.org).
BASIC METHODOLOGY
The basic methodology of constructing a vulnerability index is that the individual
measures are weighted according to their relative importance. A cumulative score
is then generated, typically by adding the weighted values. Decision trees can evalu-
ate alternative policy options.
IN HAZARD PLANNING
The concept has been extended and applied in dealing with risk from natural hazards
and the part that population metrics play in making such a situation into a disaster.
In the United States, this has been done at a county level and is run by the Hazards
and Vulnerability Research Institute.
Definitions
ISO 27005 defines threat as, “A potential cause of an incident that may result in harm
of systems and organization” (ISO/IEC 27005:2011—Information technology—
Security www.iso.org).
A more comprehensive definition, tied to an Information assurance point of view, can
be found in “Federal Information Processing Standards (FIPS) 200 (Minimum Security
Requirements for Federal, https://csrc.nist.gov/csrc/media/publications/fips/200/final/),
Minimum Security Requirements for Federal Information and Information Systems”
by the National Institute of Standards and Technology of the United States:
Any circumstance or event with the potential to adversely impact an IS through unau-
thorized access, destruction, disclosure, modification of data, and/or denial of service.
European Union Agency for Network and Information Security gives a similar
definition (https://www.enisa.europa.eu):
Any circumstance or event with the potential to adversely impact an asset through unau-
thorized access, destruction, disclosure, modification of data, and/or denial of service.
Threats are anything (e.g., object, substance, human, etc.) that are capable of acting
against an asset in a manner that can result in harm. A tornado is a threat, as is a flood,
as is a hacker. The key consideration is that threats apply the force (water, wind, exploit
code, etc.) against an asset that can cause a loss event to occur.
The National Information Assurance Training and Education Center gives a more
articulated definition of threat (niatec.info):
4. Types of computer systems related adverse events that may result in losses.
Examples are flooding, sabotage, and fraud.
5. An assertion primarily concerning entities of the external environment
(agents); we say that an agent (or class of agents) poses a threat to one or
more assets; we write: T (e; i) where: e is an external entity; i is an internal
entity or an empty set.
6. An undesirable occurrence that might be anticipated but is not the result
of a conscious act or decision. In threat analysis, a threat is defined as an
ordered pair, <peril; asset category>, suggesting the nature of these occur-
rences but not the details (details are specific to events).
7. A potential violation of security.
8. A set of properties of a specific external entity (which may be either an indi-
vidual or class of entities) that, in union with a set of properties of a specific
internal entity, implies a risk (according to some body of knowledge).
PHENOMENOLOGY
The term “threat” relates to some other basic security terms, as shown in Figure 9.1.
A resource (both physical and logical) can have one or more vulnerabilities that
can be exploited by a threat agent in a threat action. The result can potentially com-
promise the confidentiality, integrity, or availability properties of resources (poten-
tially different from the vulnerable one) of the organization and others involved
parties (customers and suppliers).
The so-called Central Intelligence Agency (CIA) triad is the basis of information
security.
The attack can be active when it attempts to alter system resources or affect their
operation, so it compromises integrity or availability. A “passive attack” attempts
to learn or make use of information from the system but does not affect system
resources: so it compromises confidentiality.
(vulnerability) of the system and the related security controls, causing a technical
impact on an IT resource (asset) connected to a business impact.
A set of policies concerned with information security management, the infor-
mation security management systems (ISMS) (www.iso.org), has been developed to
manage, according to risk management principles, the countermeasures in order to
accomplish a security strategy set-up following rules and regulations applicable in
a country. Countermeasures are also called security controls; when applied to the
transmission of information, they are named security services.
The overall picture represents the risk factors of the risk scenario (Figure 9.2).
The widespread of computer dependencies and the consequent raising of the con-
sequence of a successful attack, led to a new term: cyber warfare.
It should be noted that, nowadays, the many real attacks exploit psychology at
least as much as technology. Phishing and pretexting and other methods are called
social engineering techniques. The Web 2.0 applications, specifically social network
services, can be a means to get in touch with people in charge of system administra-
tion or even system security, inducing them to reveal sensitive information.
The most widespread documentation on computer insecurity is about technical
threats such as a computer virus, Trojan, and other malware, but a serious study to
apply cost-effective countermeasures can only be conducted following a rigorous IT
risk analysis in the framework of an ISMS: a pure technical approach will let out the
psychological attacks that are increasing threats.
Cyber threat
management
Threat intelligence research
and data management, SIEM
BigData analytics, behavior
and malware analysis,
honeypots, situational
awareness
Information Risk
security management
THREATS CLASSIFICATION
Threats can be classified according to their type and origin (Figure 9.3).
Types of threats:
Microsoft previously rated the risk of security threats using five categories in
a classification called DREAD: Risk assessment model. The model is considered
obsolete by Microsoft. The categories were as follows:
Guidance and
control
Org/agency Internal
External Feed history intelligence Feed Decision Feed Action
intelligence Observations (hypothesis) (test)
Forward Forward Forward
New Previous
information incidents
Unfolding interaction
with environment
Unfolding
interaction
Feedback with
Feedback environment
Feedback
Boyd cycle or
OODA loop
Operate at a faster tempo than adversaries adapted to
cyber threat
management
The DREAD name comes from the initials of the five categories listed.
The spread over a network of threats can lead to dangerous situations. In military
and civil fields, threat level has been defined: for example, INFOCON is a threat
level used by the United States. Leading antivirus software vendors publish global
threat level on their websites.
ASSOCIATED TERMS
The term “threat agent” is used to indicate an individual or group that can manifest
a threat. It is fundamental to identify who would want to exploit the assets of a com-
pany, and how they might use them against the company.
Individuals within a threat population, practically anyone and anything, can,
under the right circumstances, be a threat agent—the well-intentioned, but inept,
computer operator who trashes a daily batch job by typing the wrong command, the
regulator performing an audit, or the squirrel that chews through a data cable.
Threat agents can take one or more of the following actions against an asset:
It’s important to recognize that each of these actions affects different assets dif-
ferently, which drives the degree and nature of loss. For example, the potential for
productivity loss resulting from a destroyed or stolen asset depends upon how critical
that asset is to the organization’s productivity.
If a critical asset is simply illicitly accessed, there is no direct productivity loss.
Similarly, the destruction of a highly sensitive asset that doesn’t play a critical role
in productivity won’t directly result in a significant productivity loss. Yet that same
asset, if disclosed, can result in significant loss of competitive advantage or reputa-
tion and generate legal costs.
The point is that it’s the combination of the asset and type of action against the
asset that determines the fundamental nature and degree of loss. Which action(s)
a threat agent takes will be driven primarily by that agent’s motive (e.g., financial gain,
revenge, recreation, etc.) and the nature of the asset. For example, a threat agent bent
on financial gain is less likely to destroy a critical server than they are to steal an
easily pawned asset like a laptop.
It is important to separate the concept of the event that a threat agent gets in
contact with the asset (even virtually, i.e., through the network) and the event that a
threat agent acts against the asset.
Vulnerability 149
OWASP collects a list of potential threat agents in order to prevent system design-
ers and programmers insert vulnerabilities in the software.
Corporations
Corporations are engaged in offensive information warfare or competitive intelli-
gence. Partners and competitors come under this category.
THREAT SOURCE
Threat sources are those who wish a compromise to occur. It is a term used to dis-
tinguish them from threat agents/actors who are those who actually carry out the
attack and who may be commissioned or persuaded by the threat actor to knowingly
or unknowingly carry out the attack.
Threat communities
Subsets of the overall threat agent population that share key characteristics, and the
notion of threat communities is a powerful tool for understanding who and what
we’re up against as we try to manage risk.
For example, the probability that an organization would be subject to an attack
from the terrorist threat community would depend, in large part, on the characteristics
of your organization relative to the motives, intents, and capabilities of the terrorists.
The following threat communities are examples of the human malicious threat
landscape many organizations face:
Internal
• Employees
• Contractors (and vendors)
• Partners
External
THREAT ACTION
Threat action is an assault on system security. A complete security architecture deals
with both intentional acts (i.e., attacks) and accidental events. Various kinds of threat
actions are defined as subentries under “threat consequence.”
THREAT ANALYSIS
Threat analysis is the analysis of the probability of occurrences and consequences of
damaging actions to a system. It is the basis of risk analysis.
THREAT CONSEQUENCE
Threat consequence is a security violation that results from a threat action. It
includes disclosure, deception, disruption, and usurpation.
The following subentries describe four kinds of threat consequences and also list
and describe the kinds of threat actions that cause each consequence. Threat actions
that are accidental events are marked by the following.
“Unauthorized disclosure (a threat consequence)”: A circumstance or event
whereby an entity gains access to data for which the entity is not authorized. (See:
data confidentiality.) The following threat actions can cause unauthorized disclosure:
THREAT MANAGEMENT
Threats should be managed by operating an information security management sys-
tem (ISMS), performing all the IT risk management activities foreseen by laws, stan-
dards, and methodologies.
Very large organizations tend to adopt business continuity management plans
in order to protect, maintain, and recover business-critical processes and systems.
Some of these plans are foreseen to set up a computer security incident response
team or a computer emergency response team.
There are two kinds of verification of the threat management process:
THREAT HUNTING
Cyber threat hunting is the process of proactively and iteratively searching through
networks to detect and isolate advanced threats that evade existing security solu-
tions. This is in contrast to traditional threat management measures, such as firewall
intrusion detection systems, and security information and event management, which
typically involve an investigation after there has been a warning of a potential threat
or an incident has occurred.
Threat hunting can be a manual process, in which security analysts sift through
various data information using their own knowledge and familiarity with the net-
work to create hypotheses about potential threats. To be even more effective and
efficient, however, threat hunting can be partially automated, or machine assisted,
as well. In this case, the analyst utilizes a software that harnesses machine learn-
ing and user and entity behavior analytics (UEBA) to inform the analyst of poten-
tial risks.
The analyst then investigates these potential risks, tracking suspicious behav-
ior in the network. Thus, hunting is an iterative process, meaning that it must be
Vulnerability 155
continuously carried out in a loop, beginning with a hypothesis. There are three
types of hypotheses (Géron, 2017):
Analysts research their hypothesis by going through vast amounts of data about
the network. The results are then stored so that they can be used to improve the
automated portion of the detection system and to serve as a foundation for future
hypotheses.
Representative vendors of threat hunting software and services include the
following:
• Carbon Black
• Domain tools
• Exabeam
• Raytheon Foreground Security
• Sqrrl
• Tenable Network Security
157
158 Handbook of Emergency Management Concepts
DEFINITION OF TERRORISM
The definition of terrorism has proven controversial. Various legal systems and gov-
ernment agencies use different definitions of terrorism in their national legislation.
Moreover, the international community has been slow to formulate a universally
agreed, legally binding definition of this crime. These difficulties arise from the fact
that the term “terrorism” is politically and emotionally charged.
The international community has never succeeded in developing an accepted
comprehensive definition of terrorism. During the 1970s and 1980s, the United
Nations’ attempts to define the term floundered mainly due to differences of opinion
between various members about the use of violence in the context of conflicts over
national liberation and self-determination.
These divergences have made it impossible for the United Nations to conclude a
Comprehensive Convention on International Terrorism that incorporates a single,
all-encompassing, legally binding, criminal law definition of terrorism. The inter-
national community has adopted a series of sectorial conventions that define and
criminalize various types of terrorist activities.
Since 1994, the United Nations General Assembly has repeatedly condemned ter-
rorist acts using the following political description of terrorism:
Criminal acts intended or calculated to provoke a state of terror in the public, a group
of persons or particular persons for political purposes are in any circumstance unjus-
tifiable, whatever the considerations of a political, philosophical, ideological, racial,
ethnic, religious or any other nature that may be invoked to justify them.
United Nations
50/53. Measures to Eliminate International Terrorism
U.S. Code Title 22 Chapter 38, Section 2656f (d), defines terrorism as “Premeditated,
politically motivated violence perpetrated against noncombatant targets by sub-
national groups or clandestine agents, usually intended to influence an audience.”
Bruce Hoffman (2006), a scholar, has noted:
It is not only individual agencies within the same governmental apparatus that cannot
agree on a single definition of terrorism. Experts and other long-established scholars
in the field are equally incapable of reaching a consensus.
Bruce Hoffman
Inside Terrorism
acceptable, reasonably comprehensive explication of the word. Four years and a sec-
ond edition later, Schmid was no closer to the goal of his quest, conceding in the
first sentence of the revised volume that the “search for an adequate definition is still
on.” Walter Laqueur (2001) despaired of defining terrorism in both editions of his
monumental work on the subject, maintaining that it is neither possible to do so nor
worthwhile to make the attempt.
Each act of terrorism is a “performance” devised to affect many large audiences.
Terrorists also attack national symbols, to show power and to attempt to shake the
foundation of the country or society they are opposed to. This may negatively affect
a government, while increasing the prestige of the given terrorist group and/or ideol-
ogy behind a terrorist act.
Terrorist acts frequently have a political purpose. This is often where the inter-
relationship between terrorism and religion occurs.
When a political struggle is integrated into the framework of a religious or “cos-
mic” struggle, such as over the control of an ancestral homeland or holy site such as
Israel and Jerusalem, failing in the political goal (nationalism) becomes equated with
spiritual failure, which, for the highly committed, is worse than their own death or
the deaths of innocent civilians.
Their suffering accomplishes the terrorists’ goals of instilling fear, getting their
message out to an audience, or otherwise satisfying the demands of their often radi-
cal religious and political agendas.
Some official, governmental definitions of terrorism use the criterion of the
illegitimacy or unlawfulness of the act to distinguish between actions authorized
by a government (and thus “lawful”) and those of other actors, including indi-
viduals and small groups. For example, carrying out a strategic bombing on an
enemy city, which is designed to affect civilian support for a cause, would not be
considered terrorism if it were authorized by a government. Criterion is inher-
ently problematic and is not universally accepted, because it denies the existence
of state terrorism; the same act may or may not be classed as terrorism depending
on whether its sponsorship is traced to a “legitimate” government; “legitimacy”
and “lawfulness” are subjective, depending on the perspective of one government
or another; and it diverges from the historically accepted meaning and origin of
the term.
According to Ali Khan, the distinction lies ultimately in a political judgment
(Mughal, 2012).
An associated, and arguably more easily definable, but not equivalent term is
violent nonstate actor. The semantic scope of this term includes not only “terrorists,”
but while excluding some individuals or groups who have previously been described
as “terrorists” also explicitly excludes state terrorism.
Barack Obama, commenting on the Boston Marathon bombings of April 2013,
declared that “Anytime bombs are used to target innocent civilians, it is an act
of terror.” Various commentators have pointed out the distinction between “act
of terror” and “terrorism,” particularly when used by the White House. 18 U.S.C.
§ 2331 defines “international terrorism” and “domestic terrorism” for purposes of
Chapter 113B of the Code, entitled “Terrorism”:
“International terrorism” means activities with the following three characteristics:
160 Handbook of Emergency Management Concepts
Involve violent acts or acts dangerous to human life that violate federal or state
law; Appear to be intended (i) to intimidate or coerce a civilian population; (ii) to
influence the policy of a government by intimidation or coercion; or (iii) to affect
the conduct of a government by mass destruction, assassination, or kidnapping; and
Occur primarily outside the territorial jurisdiction of the U.S., or transcend national
boundaries in terms of the means by which they are accomplished, the persons they
appear intended to intimidate or coerce, or the locale in which their perpetrators
operate or seek asylum.
By distinguishing terrorists from other types of criminals and terrorism from
other forms of crime, we come to appreciate that terrorism is:
PEJORATIVE USE
The terms “terrorism” and “terrorist” (someone who engages in terrorism) carry strong
negative connotations. These terms are often used as political labels; to condemn vio-
lence or the threat of violence by certain actors as immoral, indiscriminate, and unjus-
tified; or to condemn an entire segment of a population (Figures 10.1 and 10.2).
Those labeled “terrorists” by their opponents rarely identify themselves as such
and typically use other terms or terms specific to their situation, such as separatist,
freedom fighter, liberator, revolutionary, vigilante, militant, paramilitary, guerrilla,
rebel, patriot, or any similar-meaning word in other languages and cultures. Jihadi,
Emergency Management and Understanding the Impact of Terrorism 161
RU
IQ AF
DZ LY
IL
IN
PK
YE TH
NG PH
CO SO
Since 2000 there were more
than 72 thousand attacks.
More than half of them were
conducted in four countries:
Iraq, Pakistan, Afghanistan and
India The area of the circle corresponds to
the amount of terrorist attacks in the
The number of terrorist attacks terrorist attacks
committed in the world country from 2000 to 2014
grows because of the four
countries since 2000 5000 1000 less than 40
mujaheddin, and fedayeen are similar Arabic words that have entered the English
lexicon. It is common for both parties in a conflict to describe each other as terrorists.
On whether particular terrorist acts, such as killing noncombatants, can be jus-
tified as the lesser evil in a particular circumstance, philosophers have expressed
different views. While, according to David Rodin (2007), utilitarian philosophers
can (in theory) conceive of cases in which the evil of terrorism is outweighed by the
good that could not be achieved in a less morally costly way, in practice, the “harm-
ful effects of undermining the convention of non-combatant immunity is thought to
outweigh the goods that may be achieved by particular acts of terrorism.”
Among the nonutilitarian philosophers, Michael Walzer (2016) argued that ter-
rorism can be morally justified in only one specific case: when “a nation or com-
munity faces the extreme threat of complete destruction and the only way it can
preserve itself is by intentionally targeting non-combatants, then it is morally
entitled to do so.”
162 Handbook of Emergency Management Concepts
Terrorist acts frequently have a political purpose. This is often where the inter-
relationship between terrorism and religion occurs. When a political struggle is
integrated into the framework of a religious or “cosmic” struggle, such as over the
control of an ancestral homeland or holy site such as Israel and Jerusalem, failing in
the political goal (nationalism) becomes equated with spiritual failure, which, for the
highly committed, is worse than their own death or the deaths of innocent civilians.
TYPES OF TERRORISM
Depending on the country, the political system, and the time in history, the types of
terrorism vary.
In early 1975, the Law Enforcement Assistant Administration in the United
States formed the National Advisory Committee on Criminal Justice Standards
and Goals. One of the five volumes that the committee wrote was titled “Disorders
and Terrorism,” produced by the Task Force on Disorders and Terrorism under the
direction of H. H. A. Cooper, Director of the Task Force staff (Cooper, 2017).
The Task Force defines terrorism as “a tactic or technique by means of which a
violent act or the threat thereof is used for the prime purpose of creating overwhelm-
ing fear for coercive purposes.”
It classified disorders and terrorism into six categories:
Other sources have defined the typology of terrorism in different ways, for exam-
ple, broadly classifying it into domestic terrorism and international terrorism, or
using categories such as vigilante terrorism or insurgent terrorism. One way the
typology of terrorism may be defined:
• Political terrorism
• Substate terrorism
• Social revolutionary terrorism
• Nationalist–separatist terrorism
• Religious extremist terrorism
• Religious fundamentalist terrorism
• New religions terrorism
• Right-wing terrorism
• Left-wing terrorism
• State-sponsored terrorism
• Regime or state terrorism
• Criminal terrorism
• Pathological terrorism
MOTIVATIONS OF TERRORISTS
Attacks on “collaborators” are used to intimidate people from cooperating with the
state in order to undermine state control. This strategy was used in Ireland, in Kenya,
in Algeria, and in Cyprus during their independence struggles.
Attacks on high-profile symbolic targets are used to incite counterterrorism by the
state to polarize the population. This strategy was used by Al-Qaeda in its attacks
on the World Trade Center and the Pentagon in the United States on September 11,
2001. These attacks are also used to draw international attention to struggles that are
otherwise unreported, such as the Palestinian airplane hijackings in 1970 and the
South Moluccan hostage crisis in the Netherlands in 1975.
Terrorist organizations do not select terrorism for its political effectiveness.
Individual terrorists tend to be motivated more by a desire for social solidarity with
other members of their organization than by political platforms or strategic objec-
tives, which are often murky and undefined. Additionally, possible relationships
between the type of economy within a country and ideology are associated with
terrorism. Some terrorists like Timothy McVeigh were motivated by revenge against
a state for its actions against its citizens.
is least common in the most democratic nations. However, one study suggests that
suicide terrorism may be an exception to this general rule. Evidence regarding this
particular method of terrorism reveals that every modern suicide campaign has tar-
geted a democracy—a state with a considerable degree of political freedom. The
study suggests that concessions awarded to terrorists during the 1980s and 1990s
for suicide attacks increased their frequency (Hamdan, 2015). There is a connec-
tion between the existence of civil liberties, democratic participation, and terrorism.
According to Young and Dugan, these things encourage terrorist groups to organize
and generate terror.
Some examples of terrorism in nondemocratic nations include ETA in Spain
under Francisco Franco (although the group’s terrorist activities increased sharply
after Franco’s death), the Organization of Ukrainian Nationalists in prewar Poland,
the Shining Path in Peru under Alberto Fujimori, the Kurdistan Workers Party when
Turkey was ruled by military leaders, and the ANC in South Africa. Democracies,
such as Japan, the United Kingdom, the United States, Israel, Indonesia, India, Spain,
Germany, and the Philippines, have also experienced domestic terrorism.
While a democratic nation espousing civil liberties may claim a sense of higher
moral ground than other regimes, an act of terrorism within such a state may cause
a dilemma: whether to maintain its civil liberties and thus risk being perceived as
ineffective in dealing with the problem or, alternatively, to restrict its civil liberties
and thus risk delegitimizing its claim of supporting civil liberties. For this reason,
homegrown terrorism has started to be seen as a greater threat, as stated by former
Central Intelligence Agency Director Michael Hayden (2015). This dilemma, some
social theorists would conclude, may very well play into the initial plans of the act-
ing terrorist(s), namely, to delegitimize the state and cause a systematic shift toward
anarchy via the accumulation of negative sentiments toward the state system.
Religious Terrorism
Religious terrorism is terrorism performed by groups or individuals, the motivation of
which is typically rooted in faith-based tenets. Terrorist acts throughout history have
been performed on religious grounds with the goal to either spread or enforce a system
of belief, viewpoint, or opinion. The validity and scope of religious terrorism are lim-
ited to the individual or a group view or interpretation of that belief system’s teachings.
Intimate Terrorism
Intimate terrorism (IT), also known as domestic abuse, may also involve emotional
and psychological abuse. IT is one element in a general pattern of control by one
partner over the other. IT is more likely to escalate over time, not as likely to be
mutual, and more likely to involve serious injury. IT batterers include two types:
“generally violent-antisocial” and “dysphoric–borderline.” The first type includes
people with general psychopathic and violent tendencies. The second type includes
people who are emotionally dependent on the relationship. Violence by a person
against his or her intimate partner is often done as a way to control his or her partner,
even if this kind of violence is not the most frequent.
Emergency Management and Understanding the Impact of Terrorism 165
PERPETRATORS
The perpetrators of acts of terrorism can be individuals, groups, or states. According
to some definitions, clandestine or semiclandestine state actors may also carry out
terrorist acts outside the framework of a state of war. However, the most common
image of terrorism is that it is carried out by small and secretive cells, highly moti-
vated to serve a particular cause, and many of the most deadly operations in recent
times, such as the September 11 attacks, the London underground bombing, the 2008
Mumbai attacks, and the 2002 Bali bombing were planned and carried out by a
close clique, composed of close friends, family members, and other strong social
networks. These groups benefited from the free flow of information and efficient
telecommunications to succeed where others had failed.
To avoid detection, a terrorist will look, dress, and behave normally until execut-
ing the assigned mission. Some claim that attempts to profile terrorists based on
personality, physical, or sociological traits are not useful. The physical and behav-
ioral description of the terrorist could describe almost any normal person. However,
the majority of terrorist attacks are carried out by military age men, aged 16–40
(martinslibrary.blogspot.com/2014/08/terrorism-types-of-terrorism).
Nonstate Groups
Groups not part of the state apparatus or in opposition to the state are most com-
monly referred to as a “terrorist” in the media.
State Sponsors
A state can sponsor terrorism by funding or harboring a terrorist group. Opinions as
to which acts of violence by states consist of state-sponsored terrorism vary widely.
When states provide funding for groups considered by some to be terrorist, they
rarely acknowledge them as such.
STATE TERRORISM
Civilization is based on a clearly defined and widely accepted yet often unarticu-
lated hierarchy. Violence done by those higher on the hierarchy to those lower is
nearly always invisible, that is, unnoticed. When it is noticed, it is fully rational-
ized. Violence done by those lower on the hierarchy to those higher is unthinkable
and, when it does occur, is regarded with shock, horror, and the fetishization of the
victims.
State terrorism has been used to refer to terrorist acts committed by governmen-
tal agents or forces. This involves the use of state resources employed by a state’s
foreign policies, such as using its military to directly perform acts of terrorism,
examples of which include the German bombing of London, the Japanese bombing
of Pearl Harbor, the British firebombing of Dresden, and the U.S. atomic bombing of
Hiroshima during World War II. The use of terror tactics is common in international
relations, and the state has been and remains a more likely employer of terrorism
166 Handbook of Emergency Management Concepts
House (beit)
2
People of the
book (Muslim, Clan (fukhdh)
Jewish, 3
Christian)
10
Family
Religion Tribe (qabila)
(kham) 4
(Islam)
9
1
Sect (Sunni,
Shia)
8 Region
Ethnicity 5 Infidels
(Arab) Nation 11
7 6
within the international system than insurgents. The first strike option as an example
of the “terror of coercive diplomacy” as a form of this, which holds the world hos-
tage with the implied threat of using nuclear weapons in “crisis management” and
argues that the institutionalized form of terrorism has occurred as a result of changes
that took place following World War II.
In this analysis, state terrorism exhibited as a form of foreign policy was
shaped by the presence and use of weapons of mass destruction and that the
legitimizing of such violent behavior led to an increasingly accepted form of this
state behavior.
The concept is also used to describe political repressions by governments against
their own civilian populations with the purpose of inciting fear. For example, tak-
ing and executing civilian hostages or extrajudicial elimination campaigns are com-
monly considered “terror” or terrorism, for example, during the Red Terror or the
Great Terror. Such actions are also often described as democide or genocide, which
have been argued to be equivalent to state terrorism. Empirical studies on this have
found that democracies have little democide.
Understanding the structure of the Muslim hierarchy of allegiance will help one
understand the terrorist cell structure, their duty, and the flow of information and
obedience (Figure 10.3) (Ansarian, 2010).
TACTICS
Terrorism is a form of asymmetric warfare and is more common when direct con-
ventional warfare will not be effective because forces vary greatly in power.
Emergency Management and Understanding the Impact of Terrorism 167
The context in which terrorist tactics are used is often a large-scale, unresolved politi-
cal conflict. The type of conflict varies widely; historical examples include the following:
Terrorist attacks are often targeted to maximize fear and publicity, usually using
explosives or poison. There is concern about terrorist attacks employing weapons of
mass destruction. Terrorist groups usually methodically plan attacks in advance and
may train participants, plant undercover agents, and raise money from supporters or
through organized crime. Communications occur through modern telecommunica-
tions or through old-fashioned methods such as couriers.
RESPONSES
One posting a sign notifying shoppers with the increase of surveillance is due to a
perceived increase in the risk of a terrorism threat.
Responses to terrorism are broad in scope. They can include realignments of the
political spectrum and reassessments of fundamental values.
Specific types of responses include the following:
DATABASES
The following terrorism databases are or were made publicly available for research
purposes and track specific acts of terrorism (Global Terrorism Database, http://www
.start.umd.edu/gtd):
WAR ON TERROR
The War on Terror (WoT), also known as the Global War on Terrorism, is a meta-
phor of war referring to the international military campaign that started after the
September 11 attacks on the United States. U.S. President George W. Bush first used
the term “War on Terror” on September 20, 2001. The Bush administration and
the western media have since used the term to argue a global military, political,
legal, and conceptual struggle against both organizations designated terrorist and
regimes accused of supporting them. It was originally used with a particular focus
on countries associated with Islamic terrorism organizations including al-Qaeda and
like-minded organizations.
In 2013, President Barack Obama announced that the United States was no lon-
ger pursuing a WoT, as the military focus should be on specific enemies rather than
a tactic. He stated, “We must define our effort not as a boundless ‘Global War on
Terror,’ but rather as a series of persistent, targeted efforts to dismantle specific net-
works of violent extremists that threaten America.”
U.S. Objectives
• NATO
• Trans Sahara initiative
• Major military operations (Afghanistan • Pakistan • Iraq • Somalia • Yemen)
• Allies involved in major operations
The Authorization for Use of Military Force against Terrorists, or AUMF, was
made law on September 14, 2001, to authorize the use of U.S. Armed Forces against
those responsible for the attacks on September 11, 2001. It authorized the President
to use all necessary and appropriate force against those nations, organizations, or
persons he determines planned, authorized, committed, or aided the terrorist attacks
that occurred on September 11, 2001, or harbored such organizations or persons, in
order to prevent any future acts of international terrorism against the United States
by such nations, organizations, or persons. The congress declares this is intended to
Emergency Management and Understanding the Impact of Terrorism 169
constitute specific statutory authorization within the meaning of section 5(b) of the
War Powers Resolution of 1973.
The George W. Bush administration defined the following objectives in the WoT:
• Defeat terrorists such as Osama bin Laden, Abu Musab al-Zarqawi, and
demolish their organizations
• Identify, locate, and demolish terrorists along with their organizations
• Deny sponsorship, support, and sanctuary to terrorists
• End the state sponsorship of terrorism
• Establish and maintain an international standard of accountability with
regard to combating terrorism
• Strengthen and sustain the international effort to combat terrorism
• Work with willing and able states
• Enable weak states
• Persuade reluctant states
• Compel unwilling states
• Interdict and disorder material support for terrorists
• Abolish terrorist sanctuaries and havens
• Diminish the underlying conditions that terrorists seek to exploit
• Partner with the international community to strengthen weak states and
prevent (re)emergence of terrorism
• Win the war of ideals
• Defend U.S. citizens and interests at home and abroad
• Integrate the National Strategy for Homeland Security
• Attain domain awareness
• Enhance measures to ensure the integrity, reliability, and availability of
critical, physical, and information-based infrastructures at home and abroad
• Implement measures to protect U.S. citizens abroad
• Ensure an integrated incident management capability
171
172 Handbook of Emergency Management Concepts
While many organizations have some knowledge of the various threats facing
their facilities and employees, many do not recognize how vulnerable their sites
actually are until a detailed assessment is performed.
One of the products that may result from the site security assessment is a detailed
site survey that includes the determination of the effective standoff distance at all
exposed sides of the building perimeter. Even for sites that are considered “secure,”
existing security measures are often found to be insufficient to deter a well-planned
terrorist attack.
TABLE 11.1
Probability Levels of an Undesired Event
Probability Level Specific Event
A: Frequent Likely to occur frequently
B: Probable Will occur several times
C: Occasional Likely to occur sometimes
D: Remote Unlikely but possible to occur
E: Improbable So unlikely it can be assumed occurrence may not be experienced
Managing Terrorism Threat/Vulnerability Assessments and Risk Analysis 173
TABLE 11.2
Severity Levels of Undesired Event Consequences
Severity Level Characteristics
I. Catastrophic Death, system loss, or severe environmental damage
II. Critical Severe injury, severe occupational illness, major system or environmental damage
III. Marginal Minor injury, minor occupational illness, or minor system or environmental damage
IV. Negligible Less than minor injury, occupational illness, or less than minor system or
environmental damage
Analyze
vulnerabilities
Identify
characterize Identify
the threat countermeasures
Risk
management
decisions
Cost
effective
The risk assessment generates specific threat scenarios from valid intelligence
and threat data and pairs them with vulnerabilities in its critical assets. The mul-
tidisciplinary risk assessment then assigns weights or values to these threat–asset
vulnerability pairings according to the likelihood of such events occurring and
the consequences of assets being compromised or attacked. This process is based
on a Department of Defense military standard and work by the Department of
Transportation’s Volpe National Transportation Systems Center.
The Federal Bureau of Investigation (FBI) is in the best position to take the fed-
eral lead in facilitating city-specific threat and risk assessments. The FBI, through
the Attorney General, is the lead agency for domestic terrorism crisis management.
As a member of the intelligence community, the FBI also collects, analyzes, and
reports threat information on domestic origin threats and targets.
Cities are larger and more complex than most entities subject to threat and risk assess-
ments, such as military bases, ports, and petroleum processing facilities. However, size
and complexity would not preclude conducting threat and risk assessments.
Threat and risk assessments are widely recognized as effective decision support
tools for prioritizing security investments, and we identified several public and pri-
vate sector organizations that use them.
While it is not possible to reduce risk to all potential targets against weapon of
mass destruction (WMD) terrorism, risk assessments can help ensure that training,
equipment, and other safeguards are justified and implemented based on threat, the
vulnerability of the asset to an attack, and the importance of the asset.
A vulnerability assessment should consist of experienced military and civilian
personnel from a range of disciplines, including structural and civil engineering,
security, and operations readiness. The assessment team uses a risk assessment
model to identify and rank order a site’s strengths and weaknesses. The specific
elements of the model include asset criticality, site vulnerability, and the ease with
which a threat can gain access to an asset.
A comprehensive vulnerability assessment of the U.S. surface transportation and
inner infrastructure (i.e., road, rail, transit, pipeline, and maritime) was conducted
(Transportation Security Administration, 2016). The goal of the assessment is to
1. Identify and rank key threats to and critical vulnerabilities of the national
transportation infrastructure
2. Recommend possible countermeasures to improve infrastructure protection
from a host of threats such as terrorism, accidents, and natural disasters
terrorists, and environmental and system-induced threats. In characterizing the threat, the
infrastructure examines the historical record of security and safety breaches and obtains
location-specific threat information from the intelligence community and open sources.
These threats are then paired with company assets that represent likely targets.
1. Examined threat and risk assessment approaches used by several public and
private sector organizations to deal with terrorist and other security risks and
obtained detailed information on a private company’s risk-assessment process.
Managing Terrorism Threat/Vulnerability Assessments and Risk Analysis 177
2. Determined whether training and assistance used threat and risk assess-
ments to establish requirements for dealing with WMD terrorist incidents.
3. Assessed the challenges of using formal threat and risk assessments to help
define requirements and prioritize, and target resources.
Risk is a function of the values of threat, consequence, and vulnerability. The objective
of risk management is to create a level of protection that mitigates vulnerabilities to
threats and the potential consequences, thereby reducing risk to an acceptable level.
A variety of mathematical models are available to calculate risk and to illustrate the
impact of increasing protective measures on the risk equation.
Threat Assessment
The first step in a risk management program is a threat assessment. A threat assess-
ment considers the full spectrum of threats (i.e., natural, criminal, terrorist, accidental,
178 Handbook of Emergency Management Concepts
etc.) for a given facility/location. The ISC standard addresses only manmade threats,
but individual agencies are free to expand upon the threats they consider. The assess-
ment should examine supporting information to evaluate the relative likelihood of
occurrence for each threat. For natural threats, historical data concerning frequency
of occurrence for given natural disasters such as tornadoes, hurricanes, floods, fire,
or earthquakes can be used to determine the credibility of the given threat.
For criminal threats, the crime rates in the surrounding area provide a good indi-
cator of the type of criminal activity that may threaten the facility. In addition, the
type of assets and/or activity located in the facility may also increase the target
attractiveness in the eyes of the aggressor. The type of assets and/or activity located
in the facility will also relate directly to the likelihood of various types of accidents.
For example, a facility that utilizes heavy industrial machinery will be at higher risk
for serious or life-threatening job related accidents than a typical office building.
For terrorist threats, the attractiveness of the facility as a target is a primary
consideration. In addition, the type of terrorist act may vary based on the potential
adversary and the method of attack most likely to be successful for a given scenario.
For example, a terrorist wishing to strike against the federal government may be
more likely to attack a large federal building than to attack a multitenant office build-
ing containing a large number of commercial tenants and a few government tenants.
However, if security at the large federal building makes mounting a successful
attack too difficult, the terrorist may be diverted to a nearby facility that may not
be as attractive from an occupancy perspective but has a higher probability of suc-
cess due to the absence of adequate security. In general, the likelihood of terrorist
attacks cannot be quantified statistically since terrorism is, by its very nature, ran-
dom. Specific definitions are important to quantify the level of each threat.
The more specific the definition, the more consistent the assessments will be
especially if the assessments are being performed by a large number of assessors.
Example assessments are provided below:
• Defined: Manmade: There are aggressors who utilize this tactic who are
known to be targeting this facility or the organization. There is a history of
this type of activity in the area and this facility is a known target. Specific
threats have been received or identified by law enforcement agencies.
Natural: Events of this nature occur in the immediate vicinity on a frequent
basis.
• Credible: Manmade: There are aggressors who utilize this tactic who are
known to target this type of facility. There is a history of this type of activity
in the area, and this facility and/or similar facilities have been targets previ-
ously. No specific threat has been received or identified by law enforcement
agencies. Natural: Events of this nature occur in the immediate vicinity
periodically (i.e., once every 10 years).
• Potential: Manmade: There are aggressors who utilize this tactic, but they
are not known to target this type of facility. There is a history of this type
of activity in the area, but this facility has not been a target. Natural: Events
of this nature occur in the region on a sporadic basis.
Managing Terrorism Threat/Vulnerability Assessments and Risk Analysis 179
• Minimal: Manmade: No aggressors who utilize this tactic are identified for
this facility and there is no history of this type of activity at the facility or
the neighboring area. Natural: There is no history of this type of event in
the area.
Vulnerability Assessment
Once the plausible threats are identified, a vulnerability assessment must be per-
formed. The vulnerability assessment considers the potential impact of loss from
a successful attack as well as the vulnerability of the facility/location to an attack.
Impact of loss is the degree to which the mission of the agency is impaired by a suc-
cessful attack from the given threat. A key component of the vulnerability assess-
ment is properly defining the ratings for impact of loss and vulnerability.
These definitions may vary greatly from facility to facility. For example, the
amount of time that mission capability is impaired is an important part of impact of
loss. If the facility being assessed is an Air Route Traffic Control Tower, a downtime
of a few minutes may be a serious impact of loss, while for a Social Security office,
a downtime of a few minutes would be minor. A sample set of definitions for impact
of loss is provided below. These definitions are for an organization that generates
revenue by serving the public.
aggressor and is influenced by the function and/or symbolic importance of the facil-
ity. Sample definitions for vulnerability ratings are as follows:
• Very high: This is a high-profile facility that provides a very attractive tar-
get for potential adversaries, and the level of deterrence and/or defense pro-
vided by the existing countermeasures is inadequate.
• High: This is a high-profile regional facility or a moderate profile national
facility that provides an attractive target and/or the level of deterrence and/
or defense provided by the existing countermeasures is inadequate.
• Moderate: This is a moderate-profile facility (not well known outside the local
area or region) that provides a potential target and/or the level of deterrence and/
or defense provided by the existing countermeasures is marginally adequate.
• Low: This is not a high-profile facility and provides a possible target and/
or the level of deterrence and/or defense provided by the existing counter-
measures is adequate.
The vulnerability assessment may also include detailed analysis of the potential impact
of loss from an explosive, chemical or biological attack. Professionals with specific train-
ing and experience in these areas are required to perform these detailed analyses.
Risk Analysis
A combination of the impact of loss rating and the vulnerability rating can be used to
evaluate the potential risk to the facility from a given threat. A sample risk matrix is
depicted in Figure 11.2. In Figures 11.3 through 11.5, high risks are designated by the
dark gray cells, moderate risks by the light gray cells, and low risks by the gray cells
(Figure 11.6).
Upgrade Recommendations
Based on the findings from the risk analysis, the next step in the process is to identify
countermeasure upgrades that will lower the various levels of risk. If an organization
has minimum standard countermeasures for a given facility level which are not cur-
rently present, these countermeasures should automatically be included in the upgrade
Vulnerability
Impact of loss Low Medium High Very high
Minor
Noticeable
Severe
Devastating
Vulnerability
Impact of loss Low Medium High Very high
Minor
Noticeable
Severe
Devastating
Vulnerability
Impact of loss Low Medium High Very high
Minor
Noticeable
Severe
Devastating
Vulnerability
Impact of loss Low Medium High Very high
Minor
Noticeable
Severe
Devastating
Reevaluation of Risks
The implementation of the recommended security and/or structural upgrades should
have a positive effect on the impact of loss and/or the vulnerability ratings for each
182 Handbook of Emergency Management Concepts
The risk may be acceptable over the short term. Plans to reduce risk and
Medium
mitigate hazards should be included in future plans and budgets.
mitigation upgrades.
threat. The final step in the process is to reevaluate these two ratings for each threat
in light of the recommended upgrades. Using an exterior explosive threat as an
example, the installation of window retrofits (i.e., security window film, laminated
glass, etc.) will not prevent the explosive attack from occurring, but it should reduce
the impact of loss/injury caused by hazardous flying glass. Therefore, the impact of
loss rating for an explosive threat would improve, but the vulnerability rating would
stay the same.
A second example could be introduction of an explosive into the interior of the
facility. The potential upgrade for this threat might be X-ray package screening for
every package entering the facility. While the potential impact of loss from an inter-
nal detonation remains the same, the vulnerability to an attack is lessened because
a package containing explosives should be detected prior to entering the facility. To
further reduce risk, structural hardening of the package screening areas could also
reduce potential impact of loss. Reduction of either the impact of loss rating or the
vulnerability rating has a positive effect on the reduction of overall risk.
APPLICATION
Threat/vulnerability assessments and risk analysis can be applied to any facil-
ity and/or organization. The federal government has been utilizing varying types
of assessments and analyses for many years. Federal Security Risk Management
(FSRM) is basically the process described in this paper. FSRM is currently being
used by several federal agencies as well as commercial businesses to assess their
facilities.
Software is available to assist in performing threat/vulnerability assessments and
risk analyses. The software tool associated with implementation of FSRM is entitled
Managing Terrorism Threat/Vulnerability Assessments and Risk Analysis 183
FSR-Manager (http://www.wbdg.org/resources/threat-vulnerability-assessments-and
-risk-analysis). This tool is designed to be used by security personnel and allows the user to
1. Natural surveillance
2. Natural access control
3. Territoriality
4. Maintenance
Natural surveillance follows the premise that criminals do not wish to be observed;
placing legitimate “eyes” on the street, such as providing window views and lighting,
increases the perceived risk to offenders, reduces fear for bona fide occupants and
visitors, as well as lessening reliance on camera surveillance.
Natural access control supplements physical security and operational measures
with walls, fences, ravines, or even hedges to define site boundaries, to channel legit-
imate occupants and visitors to designated entrances and to reduce access points and
escape routes.
184 Handbook of Emergency Management Concepts
Supervisory Control and Acquisition Data system threats are relevant as they
relate to HVAC, mechanical/electrical systems control, and other utility systems that
are required to operate many functions within building.
Insider Threats
One of the most serious threats may come from persons who have authorized access
to a facility. These may include disgruntled employees or persons who have gained
access through normal means (e.g., contractors, support personnel, etc.). To mitigate
this threat, some items to consider include the following:
Ballistic Threats
These threats may range from random drive-by shootings to high-powered rifle
attacks directed at specific targets within the facility (assassinations). It is important
to quantify the potential risk and to establish the appropriate level of protection.
• Locating critical assets away from direct lines of sight through windows
and doors
• Minimize number and size of windows
• Physical energy absorption screens such as solid fences, walls, and earthen
parapets
• Provide opaque windows or window treatments such as reflective coatings,
shades, or drapes to decrease sight lines
• Avoid sight lines to assets through vents, skylights, or other building
openings
• Use foyers or other door shielding techniques to block observation through
a doorway from an outside location
• Avoid main entrances to buildings or critical assets that face the perimeter
or an uncontrolled vantage point
• Understand and identify the information assets you are trying to protect.
These may include personal information, business information such as
proprietary designs or processes, national security information, or simply
the ability of your organization to communicate via email and other LAN/
WAN and wireless functions.
• Protect the physical infrastructure that supports information systems. If the
computer system is electronically secure but vulnerable to physical destruc-
tion, it may need more protection.
• Provide software and hardware devices to detect, monitor, and prevent
unauthorized access to or the destruction of sensitive information.
DECLARATION OF AN MCI
An MCI will usually be declared by the first arriving unit at the scene of the incident.
However, it may alternately be declared by a dispatcher, based on the information
available from people who call their local emergency telephone number about the
incident. A formal declaration of an MCI is usually made by an officer or chief of
the agency in charge.
Initially, the senior paramedic at the scene will be in charge of the incident, but
as additional resources arrive, a senior officer or chief will take command, usually
using an incident command system structure to form a unified command to run all
aspects of the incident. In the United States, the Incident Command System is known
as the National Incident Management System (NIMS). According to the Federal
Emergency Management Agency (FEMA), “NIMS provides the template for the
management of incidents.”
189
190 Handbook of Emergency Management Concepts
care, including triage and treatment at the scene and transport from the scene to the
hospital.
Paramedic and emergency medical technician (EMT) personnel may arrive in
ambulances, in their personal vehicles, or from another agency. They will have
control of all aspects of patient care, as assigned by the medical officer or incident
commander.
Ground ambulances will be assigned to the transport sector to transport patients
and personnel to and from the incident scene, emergency departments of hospitals,
and a designated helipad. These ambulances may be municipal services, volunteer
services, or from private corporations.
Air ambulances will transport patients from the scene or from designated heli-
pads to receiving hospitals.
Public Safety
Police officers will secure and control access to the scene, to ensure safety and
smooth operations. Utility services will ensure that utilities in the area are turned off
as necessary, in order to prevent further injury or damage at the scene.
Specialized Teams
HazMat specialists in Level II/B protection suits carry a patient out of the incident
zone to be decontaminated. Specialized rescue teams may be part of the local fire
department; they may be associated with the state, provincial, or federal govern-
ments; or they may be privately operated teams. These teams are specialists in spe-
cific types of rescue, such as urban search and rescue or confined space rescue.
HazMat teams are responsible for cleaning up and neutralizing any hazardous
materials at the scene. Sometimes, these will be specialized CBRNE (chemical, bio-
logical, radiological, nuclear, and high-yield explosives) teams. National Guard Units
have medics specifically trained in mass casualty triage who may be called in to
respond to a disaster-related incident.
Public Services
Railways and transportation agencies will be notified if an incident involves their
tracks or right-of-way or if they are required to cease operations in and through
affected areas. Transportation agencies will provide buses to transport lightly injured
Mass Casualty Incident and Mass Fatality Incident 191
people to the hospital. Buses can also provide shelter at the scene (e.g., “warming
buses”) if required.
The media plays an important role in keeping the general public informed about
the incident and in keeping them away from the incident area. However, a public
information officer should be assigned as the only designated responder who com-
municates with the media, to prevent the spread of misinformation.
Nongovernmental organizations such as St. John Ambulance, the Order of Malta,
the Red Cross, the Red Crescent, the Medical Reserve Corps, and the Salvation
Army will provide assistance with all aspects of an MCI, including trained medical
staff, vehicles, individual registration and tracking, temporary shelter, food service,
and many other important services.
Hospitals
Hospitals with emergency departments will have an MCI protocol which they initi-
ate as soon as they are notified of an MCI in their community. They will have prepa-
rations in place to receive a massive number of casualties, like calling in more staff,
pulling extra and spare equipment out of storage, and clearing nonacute patients out
of the hospital. Some hospitals will send doctors to the scene of the incident to assist
with triage, treatment, and transport of injured persons to the hospital.
This is not an exhaustive list, and many other agencies and groups of people could
be involved in an MCI.
FLOW OF AN MCI
Ideally, once an MCI has been declared, a well-coordinated flow of events will occur,
using three separate phases: triage, treatment, and transportation.
Triage
The first-arriving crew will conduct triage. Prehospital emergency triage generally
consists of a check for immediate life-threatening concerns, usually lasting no more
than one minute per patient. In North America, the START system (Simple Triage
and Rapid Treatment) is the most common and is considered the easiest to use. Using
START, the medical responder assigns each patient to one of four color-coded triage
levels, based on his or her breathing, circulation, and mental status.
The triage levels are as follows:
• Immediate: Patients who have major life-threatening injuries but are sal-
vageable given the resources available
• Delayed: Patients who have non-life-threatening injuries but are unable
to walk or exhibit an altered mental status
• Walking wounded: Patients who are able to ambulate out of the incident
area to a treatment area
• Deceased or expectant: Used for victims who are dead or whose injuries
make survival unlikely
192 Handbook of Emergency Management Concepts
Hot zone Warm zone – contamination reduction Cold zone – MCI management
Retrieval Decontamination Monitoring Triage Treatment/transport
Yellow BLS
Green
4
Patient
generator LSI 3
2
Initial triage
4
Non-ambulatory
Decon corridor ALS
Black
Yellow
Sector 3 Sector 2 Sector 1 Red
FIGURE 12.1 Simplified HazMat MCI response work flow. ALS, advance life saving; BLS,
basic life saving.
• Airway maneuvers;
• Tourniquets for life-threatening hemorrhage; and
• Where allowed by local protocols, needle decompressions for tension
pneumothoraces.
Generally, a small group of responders, usually the first two or three crews on
scene, can complete triage.
When responding to a chemical, biological, or radiological incident, the first-
arriving crew must establish safety zones prior to entering the scene.
Safety zones include the following:
These zones should be clearly identified with engineer tapes, lights, or cones.
All responders and patients must leave the hot zone in designated pathways into
the warm zone, where they will be decontaminated. A designated officer should be
posted at the hot zone and warm zone to make sure all contaminated personal are
treated and decontaminated before entering the cold zone (Figure 12.1).
Treatment
Once casualties have been triaged, they can be moved to appropriate treatment
areas. Unless a patient is Green Tagged and ambulatory, litter bearers will have to
Mass Casualty Incident and Mass Fatality Incident 193
transport patients from the incident scene to safer treatment areas located nearby.
These treatment areas must always be within walking distance and will be staffed
by appropriate numbers of properly certified medical personnel and support people.
The litter bearers do not have to be advanced medical personnel; their role is to
simply place casualties onto carrying devices and transport them to the appropri-
ate treatment area. Casualties should be transported in order of treatment priority:
red-tagged patients first, followed by yellow tagged, then green tagged, and finally
black tagged.
Each colored triage category will have its own treatment area. Treatment areas
are often defined by colored tarpaulins, flagging tape, signs, or tents. Upon arrival in
the treatment area, the casualties are reassessed and they are treated with the goal of
stabilizing them until they can be transported to hospitals, transported to the morgue
or medical examiner’s office, or released.
On-Site Morgue
Some MCIs require an on-site morgue, for several reasons:
The final stage in the prehospital management of a MCI is the transport of casual-
ties to hospitals for more definitive care. If an insufficient number of ambulances are
available, other vehicles may transport patients, such as police cars, fire trucks, air
ambulances, transit buses, or personal vehicles. As with treatment, transport priority
is decided based on the severity of the patient’s injuries. Usually, the most seriously
injured are transported first, with the least serious transported only after all the criti-
cal patients have been transported.
However, in an effort to remove as many lightly injured civilians as possible, an
incident commander may choose to have those least seriously injured transported to
local hospitals or interim-care centers in order to provide more room for emergency
personnel to work. It is also possible that lightly injured casualties will be trans-
ported first when access to those who are more severely injured will be delayed due
to heavy or difficult rescue efforts.
DEFINITIVE CARE
The care that is rendered at the scene of an MCI is usually only temporary and is
designed to stabilize the casualties until they can receive more definitive care at a
hospital or an interim-care center.
194 Handbook of Emergency Management Concepts
Interim-Care Center
An interim-care center is a temporary treatment center that allows for the assess-
ment and treatment of patients until they can either be discharged or transported to
a hospital. These are often placed in gymnasiums, schools, arenas, community cen-
ters, hotels, and/or other locations that can support a field hospital setup. Permanent
buildings are preferred to tents as they provide shelter, power, and running water,
but many governments maintain complete field hospital setups that can be deployed
anywhere within their jurisdiction within 12–24 hours. While full field hospitals
require a significant amount of time to deploy (in relation to the length of most
incidents), emergency personnel can set up temporary interim-care centers fairly
quickly if needed using the personnel and resources they have on-hand. These cen-
ters are usually staffed by a combination of doctors, nurses, paramedics/EMTs, first
responders, and social workers (e.g., from the Red Cross), who work to get families
reunited after a disaster.
Regardless of the size of the MFI, the ME/C is the legal authority to conduct
victim identification (or augment the lead investigative agencies to complete victim
identification), determine the cause and manner of death, and manage death cer-
tification. The ME/C is also responsible for other medico-legal activities, such as
notification of next of kin.
MFI is an emergency management term used to identify an incident involving
more dead bodies and/or body parts than can be located, identified, and processed
for final disposition by available response resources.
Although it is a somewhat relative term in that there is no widely accepted number
of fatalities that define an MFI, it is generally recognized that if the number of fatali-
ties exceeds the local city or county’s resource capabilities, causing them to request
assistance or mutual aid from neighboring jurisdictions, the term applies.
MFIs may or may not be a result of an MCI, which is considered a different type
of incident and usually focuses more on managing the surviving victims of an inci-
dent. MFI and MCI may, and often do, occur simultaneously. MFI differs from MCI
in that most, if not all, of the victims of the incident are deceased. A catastrophic
plane crash with no survivors is one example of an MFI. Part of the distinction
between MFI and MCI is because different kinds of resources are needed to man-
age each. Living victims are attended to by medical personnel such as EMS, and
deceased victims are attended to by medical examiners or coroners.
MFIs may be either human caused, such as hazardous materials releases, trans-
portation accidents, or terrorist attacks, or they may be the result of natural disasters
such as earthquakes, floods, or severe weather.
Some significant MFIs are
One of the naturally occurring incidents with great potential to cause a MFI is
pandemic influenza (flu). The Spanish Flu pandemic of 1918 killed millions and
overwhelmed response resources on a global level. A modern pandemic could have
similarly overwhelming impacts. Catastrophic incidents that result in mass fatalities
usually also result in mass injuries and/or illnesses. While it is more important to
dedicate resources to care for the living, many people have public health concerns
about the dead. This is one important reason why jurisdictions usually include mass
fatality planning as part of their overall emergency preparedness efforts.
After some MFI authorities have conducted hasty mass burials, research has
shown that this is a generally unsatisfactory response.
Mass burials are usually not required for public health reasons, as they increase dis-
tress among survivors and interfere with long-term community recovery. In all cultures,
there are customs and rituals for dealing with the dead. Universally, survivors want to
196 Handbook of Emergency Management Concepts
know what happened to their loved ones and that their loved ones’ remains were treated
with respect. These are important reasons to plan for mass fatality management.
Response Functions
The primary response functions in a MFI are the following:
• Section A—Acknowledgements
• Section B—Introduction
• Section C—Planning Context
• Section D—Concept Of Operation
• Section E—Incident Notification/Plan Activation
• Section F—Command and Control
• Section G—Human Remains Recovery
• Section H—Morgue Services
• Section I—Family Assistance
• Section J—Public Communications
• Section K—Death Certificates and Disposition Permits
• Section L—Death Care Industry
• Section M—Mass Fatality Plan Maintenance
• Section N—Security
• Section O—Mass Fatality Information Systems
• Section P—Staff/Volunteer Processing Center
• Section Q—Family Concerns and Religious/Cultural Considerations
• Section R—Infection and Other Health and Safety Threats
• Section S—Pandemic Influenza
Mass Casualty Incident and Mass Fatality Incident 197
Organization
For organizational purposes, the country is divided into 10 regions, each with
a regional coordinator. For the duration of their service, DMORT members work
under the local authorities of the disaster site and their professional licenses are
recognized by all states.
DMORT Teams:
MORTs are organized under the Department of Health and Human Services
(HHS) NDMS. The DMORTs are composed of civilian funeral directors, medical
examiners, coroners, pathologists, forensic anthropologists, fingerprint specialists,
forensic odontologists, dental assistants, and radiographers. They are supported by
medical records technicians and transcribers, mental health specialists, computer
professionals, administrative support staff, and security and investigative personnel.
When a DMORT is activated, the personnel on the team are treated and paid as a
temporary federal employee.
The HHS maintains three Disaster Portable Morgue Units (DPMUs), which are
staged at HHS Logistics Centers, one each in Frederick, Maryland, Fort Worth,
Texas, and San Jose, California. Each DPMU is a cache of equipment and supplies
for a complete morgue with designated workstations for each process the DMORT
team is required to complete.
Identification of Remains
Identification of remains is a two-part process that utilizes a sophisticated com-
puter program for matching physical characteristics. The families of the deceased
provide as much information about them as possible: dental records, X-rays,
198 Handbook of Emergency Management Concepts
Incidents
For the World Trade Center disaster, U.S. Secretary of Health and Human
Services Tommy G. Thompson activated the NDMS. It was the first time this
federally coordinated response system had been activated on a full nationwide
basis.
In 2006, DMORT operated the Find Family National Call Center in Baton
Rouge, Louisiana. This is the center of all operations concerning the location and
reuniting of families scattered by Hurricane Katrina and Hurricane Rita. Out of
nearly 13,000 people reported missing after the impacts of hurricanes Katrina,
Rita, Stan, and Wilma, nearly 7,000 were found alive and reunited with their
families.
Trained personnel should oversee the tasks associated with each of the three
areas.
Morgue Operations
Depending on the size and nature of the incident, the ME/C will determine where
to establish an incident morgue site. The site may be in the existing morgue for that
geographical area or it may be a temporary incident morgue site in another location,
such as a warehouse, airplane hangar, or fairground building. School gymnasiums
should not be used, particularly when school is in session.
The ME/C should lay out the morgue operation site considering the physical con-
dition of the victims, the number of victims, and the number of personnel needed to
perform such morgue functions as administration, logistics, refrigeration, and opera-
tions. The operational areas can include areas for receiving, photography, X-ray, per-
sonal effects, anthropology, dental, fingerprinting, pathology, storage, and shipping.
In some cases, an area for embalming may be desirable.
The main purposes for the morgue are to determine the cause of death and iden-
tify victims. The use of highly skilled professionals for each of the morgue opera-
tional areas is important. Postmortem records will be completed for every body and
body part as they are processed through each of the operational stations. Postmortem
records include personal effects, photography, radiographs, anthropology, finger-
prints, and dental and pathology reports.
The postmortem records will be compared to the antemortem (predeath) records
obtained from the victim’s family and other sources such as fingerprint reposito-
ries and hospitals. Personal effects, such as driver licenses found on the victim or
200 Handbook of Emergency Management Concepts
Fatality Management
Fatality management is the ability to coordinate with other organizations (e.g., law
enforcement, healthcare, emergency management, and ME/C) to ensure the proper
Mass Casualty Incident and Mass Fatality Incident 201
Task 1: Assess data from the incident to inform and guide the public health
resources needed for the response.
Task 2: Identify and coordinate with jurisdictional, regional, private, and fed-
eral Emergency Support Function 8 resources with expertise in the poten-
tial cause(s) of fatalities to make recommendations regarding all phases
of human remains disposition: recovery, processing (e.g., decontamination,
infection control, and other mitigation measures), storing, and disposing.
Task 3: Coordinate with partners to initiate predetermined (e.g., local, regional,
state, federal, and private sector) processes for all phases of human remains
disposition.
202 Handbook of Emergency Management Concepts
Overview
Mass fatality security requirements, security objectives, and information to request
when selecting sites for mass fatality operations are described below. This informa-
tion is followed by a description of the associated tools included with this section.
The associated tools are a questionnaire that can be used to perform a physical secu-
rity assessment, a security plan template, and a traffic control plan template. These
resources have been developed to assist the ME/C office and the local law enforce-
ment agency in effective mass fatality management.
These associated tools are
Security Requirements
In a mass fatality, the nature of the incident will dictate required security. The fol-
lowing are general security requirements to anticipate:
• Incident site
• Morgue (jurisdiction’s morgue, temporary incident morgue, and long-term
examination center/sifting site, if one is required)
• FAC(s)/reception center(s)
• Traffic control at all sites
In addition, agencies tasked to provide security for mass fatality operations may
also be tasked with providing heightened security throughout the jurisdiction.
Security Objectives
Key considerations for securing all mass fatality operations sites are the following:
The following are the general security objectives for each site.
Incident site objectives are as follows:
• Involve law enforcement in site selection so that major security risks can be
identified immediately.
• Collect the following information, as available, for each site:
• Exterior and interior photos
• Map-wide view
206 Handbook of Emergency Management Concepts
• Map-tight view
• Aerial photo—wide view
• Aerial photo—tight view
• Facility’s floor plan diagram
• Parking plan
• Mass transit map
Give this information with the ME/C’s proposed floor plans/layouts for the tem-
porary incident morgue and for the FAC to the law enforcement branch to assist them
with development of security and traffic control plans.
• Perimeter
• Lighting
• Parking areas
• Landscaping
• Alarms
• Fire protection
• Utility control points
• Attic, basements, crawl spaces, and air-conditioning and heating ducts
• Communications
• Physical security assessment: roadway access
• Physical security assessment: neighborhood characteristics (within four
blocks of the site)
• Physical security assessment: standard operating procedures. Public areas
(waiting areas, restrooms, and hallways). Offices within the facility that
handle money
• Security procedures
These questions are followed by a space for any specific security concerns and a
summary rating system to present an overview of security issues and requirements.
Mass Casualty Incident and Mass Fatality Incident 207
Once the security and traffic control plans have been completed, standard oper-
ating procedures will be needed. It is expected that law enforcement agencies will
modify existing applicable operating procedures as required to implement the secu-
rity and traffic control plans.
The Physical Security Assessment, Security Plan Template, and Traffic Control
Plan Template are included as tools to assist jurisdictions in developing mass fatality
security and traffic control plans.
These tools are based on the work of many County Department of Public Health
Emergency Preparedness & Response Program’s multidisciplined Strategic National
Stockpile Force Protection Committee’s work on security for Points of Dispensing
Preplans.
The purpose of mass casualty and mass fatality incidents is to respond to and
manage differently than our normal response system (Figure 12.2).
Admin
Most mass casualty/fatality incidents occur without notice, yet require a major
response effort. Because of the number of casualties, first arriving emergency work-
ers are often overwhelmed.
A majority of our existing plans are designed to effectively respond to major
incidents. However, for mass casualty/fatality incidents, they must be expanded in
scope very quickly (Figure 12.3). The incident management provides the means to
accomplish this and maintain control.
13 Emergency Management
and Weapons of
Mass Destruction
A weapon of mass destruction (WMD) is a nuclear, radiological, chemical, biologi-
cal, or other weapon that can kill and bring significant harm to a large number of
humans or cause great damage to human-made structures (e.g., buildings), natural
structures (e.g., mountains), or the biosphere. The scope and application of the term
has evolved and been disputed, often signifying more politically than technically.
Originally coined in reference to aerial bombing with chemical explosives, since
World War II it has come to refer to large-scale weaponry of other technologies, such
as chemical, biological, radiological, or nuclear.
209
210 Handbook of Emergency Management Concepts
Other documents expand the definition of WMD to also include radiological or con-
ventional weapons. The U.S. military refers to WMD as (Department of Defense, 2012):
Chemical weapons expert Gert G. Harigel considers only nuclear weapons true
WMDs because “only nuclear weapons are completely indiscriminate by their explo-
sive power, heat radiation and radioactivity, and only they should therefore be called
a weapon of mass destruction.” He prefers to call chemical and biological weapons
“weapons of terror” when aimed against civilians and “weapons of intimidation” for
soldiers (Harigel, 2017).
For a period of several months in the winter of 2002–2003, U.S. Deputy Secretary
of Defense Paul Wolfowitz frequently used the term “weapons of mass terror,”
apparently also recognizing the distinction between the psychological and the physi-
cal effects of many things currently falling into the WMD category.
Gustavo Bell Lemus, the vice president of Colombia, at the July 9, 2001, United
Nations (UN) Conference on the Illicit Trade in Small Arms and Light Weapons in
All Its Aspects, quoted the Millennium Report of the UN Secretary-General to the
General Assembly, in which Kofi Annan said that small arms could be described as
WMD because the fatalities they cause “dwarf that of all other weapons systems—and
in most years greatly exceed the toll of the atomic bombs that devastated Hiroshima
and Nagasaki” (United Nations, 2001).
An additional condition often implicitly applied to WMD is that the use of
the weapons must be strategic. In other words, they would be designed to “have
consequences far outweighing the size and effectiveness of the weapons themselves.”
Emergency Management and Weapons of Mass Destruction 211
The strategic nature of WMD also defines their function in the military doctrine of
total war as targeting the means a country would use to support and supply its war
effort, specifically its population, industry, and natural resources.
Within U.S. civil defense organizations, the category is now Chemical, Biological,
Radiological, Nuclear, and Explosive, which defines WMD as
Military
For the general purposes of national defense, the U.S. Code defines a WMD as:
Any weapon or device that is intended, or has the capability, to cause death or serious
bodily injury to a significant number of people through the release, dissemination, or
impact of:
• Toxic or poisonous chemicals or their precursors
• A disease organism
• Radiation or radioactivity
For the purposes of the prevention of weapons proliferation, the U.S. Code defines
WMDs as “chemical, biological, and nuclear weapons, and chemical, biological, and
nuclear materials used in the manufacture of such weapons.”
Criminal (Civilian)
For the purposes of U.S. criminal law concerning terrorism, WMDs are defined as
follows (FBI, www.fbi.gov):
• Any “destructive device” as defined in Title 18 USC Section 921: any explo-
sive, incendiary, or poison gas—bomb, grenade, rocket having a propellant
charge of more than four ounces, missile having an explosive or incendiary
charge of more than one-quarter ounce, mine, or device similar to any of
the devices described in the preceding clauses
• Any weapon designed or intended to cause death or serious bodily injury
through the release, dissemination, or impact of toxic or poisonous chemi-
cals or their precursors
• Any weapon involving a disease organism
• Any weapon designed to release radiation or radioactivity at a level danger-
ous to human life
• Any device or weapon designed or intended to cause death or serious bodily
injury by causing a malfunction of or destruction of an aircraft or other
vehicle that carries humans or of an aircraft or other vehicle whose mal-
function or destruction may cause said aircraft or other vehicle to cause
death or serious bodily injury to humans who may be within range of the
vector in its course of travel or the travel of its debris
Indictments and convictions for possession and use of WMD such as truck bombs,
pipe bombs, shoe bombs, and cactus needles coated with a biological toxin have been
obtained under 18 USC 2332a.
As defined by 18 USC §2332 (a) (“Use of Weapons of Mass Destruction,” https://
www.law.cornell.edu/uscode/text/18/2332a), a WMD is
A variety of treaties and agreements have been enacted to regulate the use, devel-
opment, and possession of various types of WMDs. Treaties may regulate weap-
ons use under the customs of war (Hague Conventions and Geneva Protocol), ban
specific types of weapons (Chemical Weapons Convention and Biological Weapons
Convention), limit weapons research (Partial Test Ban Treaty and Comprehensive
Nuclear-Test-Ban Treaty), limit allowable weapons stockpiles and delivery systems
(START I and SORT), or regulate civilian use of weapon precursors (Chemical
Weapons Convention and Biological Weapons Convention). The history of weapons
control has also included treaties to limit effective defense against WMDs in order to
preserve the deterrent doctrine of mutual assured destruction (Anti-Ballistic Missile
Treaty) as well as treaties to limit the spread of nuclear technologies geographically
(African Nuclear Weapons Free Zone Treaty and Nuclear Non-Proliferation Treaty).
U.S. Politics
Due to the indiscriminate impact of WMD, the fear of a WMD attack has shaped
political policies and campaigns, fostered social movements, and has been the cen-
tral theme of many films. Support for different levels of WMD development and
control varies nationally and internationally. Yet understanding of the nature of the
threats is not high, in part because of imprecise usage of the term by politicians and
the media.
214 Handbook of Emergency Management Concepts
An Atomic-Bomb Blueprint
Fear of WMD, or of threats diminished by the possession of WMD, has long been
used to catalyze public support for various WMD policies. They include mobiliza-
tion of pro- and anti-WMD campaigners alike and generation of popular political
support. The term WMD may be used as a powerful buzzword or to generate a
culture of fear. It is also used ambiguously, particularly by not distinguishing among
the different types of WMD.
More recently, the threat of potential WMD in Iraq was used by President George
W. Bush as justification for the 2003 invasion of Iraq. Broad reference to Iraqi WMD
in general was seen as an element of President Bush’s arguments. The claim that Iraq
possessed WMDs led to the invasion of Iraq in 2003 by Coalition forces.
Over 500 munitions were discovered throughout Iraq since 2003 containing
chemical agents mustard and Sarin gas, produced in the 1980s and no longer usable
as originally intended.
In 2004, Polish troops found nineteen 1980s-era rocket warheads, thwarting an
attempt by militants to buy them at $5,000 each. Some of the rockets contained
extremely deteriorated nerve agent.
The American Heritage Dictionary defines a WMD as “a weapon that can cause
widespread destruction or kill large numbers of people, especially a nuclear, chemi-
cal, or biological weapon.” In other words, it does not have to be NBC.
For example, the terrorist for the Boston Marathon bombings was charged under
U.S. law 18 U.S.C. 2332A for using a WMD, and that was a pressure cooker bomb. In
other words, it was a weapon that caused large-scale death and destruction, without
being an NBC weapon.
MEDIA COVERAGE
In 2004, the Center for International and Security Studies at Maryland (CISSM)
released a report examining the media’s coverage of WMD issues during three sepa-
rate periods: nuclear weapons tests by India and Pakistan in May 1998, the U.S.
announcement of evidence of a North Korean nuclear weapons program in October
2002, and revelations about Iran’s nuclear program in May 2003 (Moeller, 1998).
The CISSM report notes that poor coverage resulted less from political bias among the
media than from tired journalistic conventions. The report’s major findings were that:
• The repetition of tentative news stories, even if they are subsequently dis-
confirmed, can assist in the creation of false memories in a substantial pro-
portion of people.
• Once information is published, its subsequent correction does not alter
people’s beliefs unless they are suspicious about the motives underlying the
events the news stories are about.
• When people ignore corrections, they do so irrespective of how certain they
are that the corrections occurred.
A poll conducted between June and September 2003 asked people whether they
thought evidence of WMD had been discovered in Iraq since the war ended.
They were also asked which media sources they relied upon. Those who obtained
their news primarily from Fox News were three times as likely to believe that evi-
dence of WMD had been discovered in Iraq as those who relied on PBS and NPR
for their news, and one third more likely than those who primarily watched CBS.
NUCLEAR TERRORISM
Nuclear terrorism refers to an act of terrorism in which a person or persons belong-
ing to a terrorist organization detonates a nuclear device. Some definitions of
nuclear terrorism include the sabotage of a nuclear facility and/or the detonation of
a radiological device, colloquially termed a dirty bomb, but consensus is lacking.
In legal terms, nuclear terrorism is an offense committed if a person unlawfully
and intentionally “uses in any way radioactive material…with the intent to cause
death or serious bodily injury; or with the intent to cause substantial damage to
property or to the environment; or with the intent to compel a natural or legal per-
son, an international organization or a State to do or refrain from doing an act,”
according to the 2005 UN International Convention (https://treaties.un.org/doc/db
/Terrorism/english-18-15.pdf) for the Suppression of Acts of Nuclear Terrorism.
The possibility of terrorist organizations using nuclear weapons (including those
of a relatively smaller size), such as those contained within suitcases (suitcase nuclear
device), is something which is known of within U.S. culture and at times previously
216 Handbook of Emergency Management Concepts
discussed within the political settings of the United States. It is considered plausible
that terrorists could acquire a nuclear weapon.
However, despite thefts and trafficking of small amounts of fissile material, all
low-concern and less than Category III Special nuclear material (SNM), there is
no credible evidence that any terrorist group has succeeded in obtaining Category I
SNM, the necessary multi-kilogram critical mass amounts of weapons grade pluto-
nium required to make a nuclear weapon.
SCOPE
Nuclear terrorism could include the following:
Nuclear terrorism, according to a 2011 report published by the Belfer Center for
Science and International Affairs at Harvard University, can be executed and distin-
guished via four pathways (Harvard Kennedy School of Government, 2007):
1. The use of a nuclear weapon that has been stolen or purchased on the black
market
2. The use of a crude explosive device built by terrorists or by nuclear scien-
tists who the terrorist organization has furtively recruited
3. The use of an explosive device constructed by terrorists and their accom-
plices using their own fissile material
4. The acquisition of fissile material from a nation-state
U.S. President Barack Obama calls nuclear terrorism “the single most important
national security threat that we face.” In his first speech to the U.N. Security Council,
President Obama said that “Just one nuclear weapon exploded in a city—be it New York
or Moscow, Tokyo or Beijing, London or Paris—could kill hundreds of thousands of
people.” It would “destabilize our security, our economies, and our very way of life.”
Militant Groups
Nuclear weapons materials on the black market are a global concern, and there is
concern about the possible detonation of a small, crude nuclear weapon by a militant
group in a major city, with significant loss of life and property.
It is feared that a terrorist group could detonate a dirty bomb, a type of radiological
weapon. A dirty bomb is made of any radioactive source and a conventional explo-
sive. There would be no nuclear blast and likely no fatalities, but the radioactive
material is dispersed and can cause extensive fallout depending on the material used.
Emergency Management and Weapons of Mass Destruction 217
A foot-long stick of radioactive cobalt could be taken from a food irradiation plant
and combined with ten pounds of explosives to contaminate 1,000 square kilome-
ters and make some areas uninhabitable for decades. There are other radiological
weapons called radiological exposure devices where an explosive is not necessary.
A radiological weapon may be very appealing to terrorist groups as it is highly suc-
cessful in instilling fear and panic among a population (particularly because of the
threat of radiation poisoning) and would contaminate the immediate area for some
period of time, disrupting attempts to repair the damage and subsequently inflicting
significant economic losses.
• There have been 18 incidents of theft or loss of HEU and plutonium con-
firmed by the IAEA.
• Security specialist Shaun Gregory argued in an article that terrorists have
attacked Pakistani nuclear facilities three times in the recent past, twice in
2007 and once in 2008.
• In November 2007, burglars with unknown intentions infiltrated the
Pelindaba nuclear research facility near Pretoria, South Africa. The bur-
glars escaped without acquiring any of the uranium held at the facility.
• In June 2007, the Federal Bureau of Investigation released to the press the
name of Adnan Gulshair el Shukrijumah, allegedly the operations leader for
developing tactical plans for detonating nuclear bombs in several American
cities simultaneously.
• In November 2006, MI5 warned that al-Qaida was planning on using
nuclear weapons against cities in the United Kingdom by obtaining the
bombs via clandestine means.
• In February 2006, Oleg Khinsagov of Russia was arrested in Georgia,
along with three Georgian accomplices, with 79.5 grams of 89% HEU.
• The Alexander Litvinenko poisoning with radioactive polonium “repre-
sents an ominous landmark: the beginning of an era of nuclear terrorism,”
according to Andrew J. Patterson (Sensagent Corporation, 2016).
• In June 2002, U.S. citizen José Padilla was arrested for allegedly planning
a radiological attack on the city of Chicago; however, he was never charged
with such conduct. He was instead convicted of charges that he conspired
to “murder, kidnap and maim” people overseas.
http://taylorandfrancis.com
14 Cyberspace and
Emergency Management
Cyberspace is “the notional environment in which communication over computer
networks occurs” (Reynolds, 2016). The word became popular in the 1990s when
the uses of the Internet, networking, and digital communication were all growing
dramatically and the term “cyberspace” was able to represent the many new ideas
and phenomena that were emerging.
The parent term of cyberspace is “cybernetics,” derived from the Ancient Greek
(steersman, governor, pilot, or rudder), a word introduced by Norbert Wiener for his
pioneering work in electronic communication and control science.
As a social experience, individuals can interact, exchange ideas, share informa-
tion, provide social support, conduct business, direct actions, create artistic media,
play games, engage in political discussion, and so on, using this global network.
They are sometimes referred to as cybernauts.
The term “cyberspace” has become a conventional means to describe anything
associated with the Internet and the diverse Internet culture.
The U.S. government recognizes the interconnected information technology (IT)
and the interdependent network of IT infrastructures operating across this medium
as part of the U.S. national critical infrastructure. Among individuals on cyberspace,
there is believed to be a code of shared rules and ethics mutually beneficial for all to
follow, referred to as cyber ethics.
Many view the right to privacy as most important to a functional code of cyber
ethics. Such moral responsibilities go hand in hand when working online with global
networks, specifically, when opinions are involved with online social experiences.
Cyberspace is defined more by the social interactions involved rather than its
technical implementation. In their view, the computational medium in cyberspace
is an augmentation of the communication channel between real people; the core
characteristic of cyberspace is that it offers an environment that consists of many
participants with the ability to affect and influence each other. They derive this con-
cept from the observation that people seek richness, complexity, and depth within a
virtual world.
VIRTUAL ENVIRONMENTS
Although the present-day, loose use of the term “cyberspace” no longer implies or
suggests immersion in a virtual reality, current technology allows the integration of a
number of capabilities (sensors, signals, connections, transmissions, processors, and
controllers) sufficient to generate a virtual interactive experience that is accessible
regardless of a geographic location.
219
220 Handbook of Emergency Management Concepts
• Cyber crime
• Cyber activism
• Cyber espionage (advanced persistent threat or APT)
Those accumulated data based on research and analysis enable states to come up with
preventive measures in advance. Considering the seriousness of the impacts of cyber
threats, CTI has been raised as an efficient solution to maintain international security.
Cyberspace and Emergency Management 221
Types of CTI
According to UK’s Centre for the Protection of National Infrastructure (CPNI), there
are four types of threat intelligence (CPNI, 2017):
In the financial sector, the CBEST* framework of the Bank of England assumes
that penetration testing is no longer adequate to protect sensitive business sectors,
such as the banking sector. In response, the UK Financial Authorities (Bank of
England, Her Majesty’s Treasury, and the Financial Conduct Authority) recommend
several steps to guard financial institutions from cyber threats, including receiving
“advice from the CTI providers operating within the UK Government” (Bank of
England, 2016).
* To assist the boards of financial firms and infrastructure providers, and regulators, in improving their
understanding of the types of cyber-attack that could undermine financial stability in the UK, and the
extent to which the UK financial sector is vulnerable to those attacks, a new, intelligence-led testing
framework has been devised by the UK Financial Authorities in conjunction with CREST (the Council
for Registered Ethical Security Testers) and Digital Shadows.
222 Handbook of Emergency Management Concepts
CYBER WARFARE
Cyber warfare has been defined as “actions by a nation-state to penetrate another
nation’s computers or networks for the purposes of causing damage or disruption”
(IMSM, 2010), but other definitions also include nonstate actors, such as terrorist
groups, companies, political or ideological extremist groups, hacktivists, and trans-
national criminal organizations.
Some governments have made it an integral part of their overall military strategy,
with some having invested heavily in cyber warfare capability. Cyber warfare is
essentially a formalized version of penetration testing in which a government entity
has established it as a warfighting capability. This capability uses the same set of
penetration testing methodologies but applies them, in the case of U.S. doctrine, in
a strategic way to
Offensive operations are also part of these national level strategies for officially
declared wars as well as undeclared secretive operations.
Types of Threat
1. Cyber-attacks, where damage or disruption is caused are the main concern
2. Cyber espionage, which can provide the information needed to launch a
successful attack
Espionage
Traditional espionage is not an act of war, nor is cyber-espionage, and both are gener-
ally assumed to be ongoing between major powers.
Despite this assumption, some incidents can cause serious tensions between
nations and are often described as “attacks.” Examples are the following:
Sabotage
Computers and satellites that coordinate other activities are vulnerable components
of a system and could lead to the disruption of equipment. Compromise of military
systems, such as C4ISTAR components that are responsible for orders and commu-
nications, could lead to their interception or malicious replacement. Power, water,
fuel, communications, and transportation infrastructure all may be vulnerable to dis-
ruption. Especially the civilian realm is also at risk, noting that the security breaches
have already gone beyond stolen credit card numbers and that potential targets can
also include the electric power grid, trains, or the stock market.
In mid-July 2010, security experts discovered a malicious software program called
Stuxnet that had infiltrated factory computers and had spread to plants around the
world. It is considered “the first attack on critical industrial infrastructure that sits
at the foundation of modern economies,” notes The New York Times (Zetter, 2014).
Stuxnet, while extremely effective in delaying Iran’s nuclear program for the
development of nuclear weaponry, came at a high cost. For the first time, it became
clear that not only could cyber weapons be defensive but they could also be offensive.
The large decentralization and scale of cyberspace makes it extremely difficult to
direct from a policy perspective.
Nonstate actors can play as large a part in the cyberwar space as state actors can,
which leads to dangerous, sometimes disastrous, consequences.
Small groups of highly skilled malware developers are able to as effectively
impact global politics and cyber warfare as large governmental agencies. A major
aspect of this ability lies in the willingness of these groups to share their exploits and
developments on the web as a form of arms proliferation.
This allows lesser hackers to become more proficient in creating the large-scale
attacks that once only a small handful were skillful enough to manage. In addition,
thriving black markets for these kinds of cyber weapons are buying and selling these
cyber capabilities to the highest bidder without regard for consequences.
DENIAL-OF-SERVICE ATTACK
In computing, a denial-of-service attack (DoS attack) or distributed DoS attack is
an attempt to make a machine or network resource unavailable to its intended users.
Perpetrators of DoS attacks typically target sites or services hosted on high-
profile web servers such as banks, credit card payment gateways, and even root name
servers.
DoS attacks may not be limited to computer-based methods, as strategic physical
attacks against infrastructure can be just as devastating. For example, cutting under-
sea communication cables may severely cripple some regions and countries with
regard to their information warfare ability.
MOTIVATIONS
Military
In the United States, General Keith B. Alexander, first head of the recently formed
USCYBERCOM, told the Senate Armed Services Committee that computer net-
work warfare is evolving so rapidly that there is a “mismatch between our techni-
cal capabilities to conduct operations and the governing laws and policies. Cyber
Command is the newest global combatant and its sole mission is cyberspace, out-
side the traditional battlefields of land, sea, air and space” (Sensagent, 2016). It will
attempt to find and, when necessary, neutralize cyber-attacks and to defend military
computer networks.
Now, the issue for the computer warfare command is envisioned, listing the kind
of targets that his or her new headquarters could be ordered to attack, including
“traditional battlefield prizes—command-and-control systems at military head-
quarters, air defense networks and weapons systems that require computers to
operate.”
One cyber warfare scenario, Cyber Shockwave, which was war gamed on the cab-
inet level by former administration officials, raised issues ranging from the National
Guard to the power grid to the limits of statutory authority.
The distributed nature of internet-based attacks means that it is difficult to deter-
mine motivation and attacking party, meaning that it is unclear when a specific act
should be considered an act of war.
Civil
Potential targets in internet sabotage include all aspects of the Internet from the
backbones of the web, to the internet service providers, to the varying types of data
communication mediums and network equipment. This would include web servers,
enterprise information systems, client server systems, communication links, network
equipment, and the desktops and laptops in businesses and homes. Electrical grids
and telecommunication systems are also deemed vulnerable, especially due to cur-
rent trends in automation.
Cyberspace and Emergency Management 225
Hacktivism
Politically motivated hacktivism involves the subversive use of computers and com-
puter networks to promote an agenda and can potentially extend to attacks, theft, and
virtual sabotage that could be seen as cyber warfare—or mistaken for it.
Private Sector
Computer hacking represents a modern threat in ongoing industrial espionage
and as such is presumed to widely occur. It is typical that this type of crime is under-
reported. Corporations around the world face millions of cyber-attacks a day. Most
of these attacks don’t gain any media attention or lead to strong political statements
by victims. This type of crime is usually financially motivated.
CYBER SPYING
Cyber spying, or cyber espionage, is the act or practice of obtaining secrets without
the permission of the holder of the information (personal, sensitive, proprietary, or
of classified nature), from individuals, competitors, rivals, groups, governments, and
enemies for personal, economic, political, or military advantage using methods on
the Internet, networks, or individual computers through the use of cracking tech-
niques and malicious software including Trojan horses and spyware.
It may wholly be perpetrated online from computer desks of professionals on
bases in faraway countries or may involve infiltration at home by computer-trained
conventional spies and moles or in other cases may be the criminal handiwork of
amateur malicious hackers and software programmers.
Details
Cyber spying typically involves the use of such access to secrets and classified infor-
mation or control of individual computers or whole networks for a strategic advan-
tage and for psychological, political, and physical subversion activities and sabotage.
More recently, cyber spying involves analysis of public activity on social networking
sites like Facebook and Twitter.
Such operations, like non-cyber-espionage, are typically illegal in the victim
country while fully supported by the highest level of government in the aggressor
country.
The ethical situation likewise depends on one’s viewpoint, particularly one’s
opinion of the governments involved.
In response to reports of cyber spying by China against the United States, Amitai
Etzioni of the Institute for Communitarian Policy Studies has suggested that China
and the United States should agree to a policy of mutually assured restraint with
respect to cyberspace (Revolvy, 2017).
This would involve allowing both states to take the measures they deem nec-
essary for their self-defense while simultaneously agreeing to refrain from taking
offensive steps or engaging in cyber espionage; it would also entail vetting these
226 Handbook of Emergency Management Concepts
commitments. In September 2015, the United States and China agreed not to allow
parties in their nations to cyber spy on each other for commercial gain, but did not
prohibit government spying.
Current Status
Information warfare is an emergent reality that comes from a self-organization pro-
cess that has never been seen before. The problem is that we talk about it using terms
that have well-known connotations. And it is difficult to talk about something com-
pletely new using words that bring with them specific understanding and expectan-
cies. The early period of the automobile faced a similar situation. At one time, it was
called a “horseless carriage,” as this was the only way to define its essential quality.
The car is more than a carriage without a horse. This is the dilemma we face
when we discuss information warfare. The danger is that the uses of familiar words
misrepresent and mask the true extend of the revolution that will have to take place
if we are to be able to retain a military capacity in a new physical, social, and cogni-
tive space.
The mission of the Proactive, Preemptive Operations Group (P2OG; a U.S. intel-
ligence agency that would employ “black world” [black operations] tactics) is report-
edly to conduct aggressive, proactive, and preemptive operations to interdict and
disrupt the threat using psychological operations, managed information dissemi-
nation, precision targeting, information warfare operations, and signals intelligence
(SIGINT). The proactive defense strategy is meant to improve information collection
by stimulating reactions of the threat agents, provide strike options, and enhance
operational preparation of the real or virtual battle space.
The P2OG has been recommended to be constituted of “one hundred ‘highly
specialized’ people with unique technical and intelligence skills such as informa-
tion operations, PSYOPS, network attack, covert activities, SIGINT, HUMINT,
SOF, influence warfare/deception operations and to report to the National Security
Council.”
The DoD doctrinally would initiate a “preemptive” attack on the basis of evidence
that an enemy attack is imminent. Proactive measures, according to the DoD, are
those actions taken directly against the preventive stage of an attack by the enemy.
Strike-back doctrine aligns with the preemptive and counterattack tactics of a
proactive cyber defense strategy.
To meet these objectives, the National Strategy outlines five national priorities:
CYBER-HUMINT
Cyber-Humint refers to the set of skills used by hackers, within cyberspace, in order to
obtain private information while attacking the human factor, using various psychologi-
cal deceptions. Cyber-Humint includes the use of traditional human espionage method-
ologies, such as agent recruitment, information gathering through deception (traditionally
known as Humint), combined with deception technologies known as social engineering.
Background in Cyber-Humint
Intelligence gathering involves a range of specialized approaches—from SIGINT,
imagery intelligence, measurement and signature intelligence, and geospatial intel-
ligence, to OSINT. In many cases, information collected from human sources is still
considered highly reliable by intelligence analysts, especially while transforming a
collection of disparate data strands into an actionable prevention plan.
Cyber-Humint methodology was first coined by Ed Alcantara AFX DBI in
February 2010 (AOL Inc., 2017). Amit Steinhart argued that the cooperation between
skilled Humint experts trained with specific Humint capabilities and computer
security specialists, who apply “social engineering” techniques, is one of the main
advantages of Cyber-Humint. Steinhart offered a new model of information security
strategy that imports concepts from Humint espionage and combines it with social
engineering strategies, such as the usage of avatars for agents operating in cyber-
space or information and disinformation spreading through cyberspace.
Humint experts often argue that in comparison to the relatively young social
engineering concept, Humint practices, which had been developed for many years
by professionals working at national intelligence services, hold the higher ground in
terms of experience, technologies, and practices. A new form of cyber capability was
created when the technical capabilities of computer experts were combined with the
intelligence experience of Humint experts.
intelligence capabilities, to help identify cyber aggressors and assess their abilities
and tactical skills.
Recently, information security has shifted from building firewalls to building
systems, in order to provide real-time intelligence. Most near-future scenarios sug-
gest that organizations who fail to adapt to the systematic cyber approach will find
themselves in a critical situation.
In 2011, attention was drawn to the fact that while cybersecurity experts can
deliver extensive reports on Internet risks, most of the alerts are still general and
unspecific and do not actually meet the expectations of the specific organization. In
addition, cybersecurity companies locate hackers or cyber-attackers only when the
attack is already in progress or, worse, after a given system has already been dam-
aged or compromised.
The majority of cybersecurity defenders currently use automatic network scans
as a routine measure. A human analyst becomes involved only at the final stage of
data gathering, which means that the bulk of the available data will not be analyzed
in real time.
CYBERSECURITY STANDARDS
Cybersecurity standards (also styled cyber security standards) are techniques gener-
ally set forth in published materials that attempt to protect the cyber environment
of a user or organization. This environment includes users themselves, networks,
devices, all software, processes, information in storage or transit, applications, ser-
vices, and systems that can be connected directly or indirectly to networks.
Principal objective is to reduce the risks, including prevention or mitigation of
cyber-attacks. These published materials consist of collections of tools, policies,
security concepts, security safeguards, guidelines, risk management approaches,
actions, training, best practices, assurance, and technologies.
INTRODUCTION
Homeland Security Presidential Directive 5—Management of Domestic Incidents
called for the establishment of a single, comprehensive national incident manage-
ment system.
As a result, the U.S. Department of Homeland Security released the NIMS in
March (Department of Homeland Security, 2008). The NIMS provides a systematic,
proactive approach guiding departments and agencies at all levels of government, the
private sector, and NGOs to work seamlessly to prepare for, prevent, respond to,
recover from, and mitigate the effects of incidents, regardless of cause, size, location,
or complexity, in order to reduce the loss of life, property, and harm to the environment.
This consistency provides the foundation for implementation of the NIMS for
all incidents, ranging from daily occurrences to incidents requiring a coordinated
Federal response. The NIMS document, as revised in 2007, reflects contributions
from stakeholders and lessons learned during recent incidents.
States and territories play an important role in ensuring effective NIMS imple-
mentation; not only must they implement NIMS within state and territory depart-
ments and agencies but also ensure that the systems and processes are in place to
communicate and support NIMS compliance at all jurisdictional levels. In some
instances, when tribal nations or local government may not have the resources to
235
236 Handbook of Emergency Management Concepts
implement all NIMS elements on their own, states and territories should support
their efforts by encouraging them to cooperate with other localities in their regions
and pool their resources to implement NIMS.
The long-term goal of NIMS is to provide a consistent framework for all aspects
of emergency management and incident response. This framework should be sus-
tainable, flexible, and scalable to meet changing incident needs and allow for integra-
tion of other resources from various partners through mutual aid agreements and/or
assistance agreements.
The following are the NIMS Compliance Objectives and a path to follow when
performing emergency management planning process and setting up objectives.
your community surveys and hazard analysis and vulnerability surveys will help one
create and maintain a common sense approach to the emergency planning process.
It is recommended for all response personnel and emergency management personnel
to have the following courses from Federal Emergency Management Agency (FEMA).
These courses are online and of no charge to the agency and local government.
ICS and NIMS courses:
The NIMS ICS All-Hazards Position Specific Training Program official website is at
https://training.fema.gov/allhazards/.
SUMMARY
The following are emergency management skills, training, and experiences needed
to be an effective emergency manager and direct these operations.
Technology used:
Having the ability and communicating skills with supervisors, peers, or subordi-
nates will provide the information by using the following means, telephone, written
form, e-mail, or in person.
Maintaining Certification
The PDS and APS do not require a recertification once initially completed. The
CEM/AEM credential requires recertification every five years. That recertification
is required to remain current in the emergency management field. The recertifica-
tion requirements include 100 hours of training, with at least 75 hours in emergency
management and six contributions to the field of emergency management.
Benefits of Certifications
You may be asking yourself what the benefits of being certified are. One of the pri-
mary reasons for becoming certified is to be NIMS compliant. By being certified,
you show that you are knowledgeable in the four core components of emergency
management: preparedness, response, recovery, and mitigation. The certification is
recognized as a standard that is recognized across the country. Another reason is to
be professionally recognized by other professional emergency managers. The next
reason may appear to be a little selfish, but it is valid nevertheless. By being certified,
you are more marketable in looking for another position, whether it is for a promo-
tion or another position outside of the law enforcement profession. Many positions
for managers in emergency management or homeland security are seeking a CEM as
a prerequisite to employment. With that in mind, when will you start your certifica-
tion process?
Some really important traits for an emergency manager or those working in the
emergency management field are the following:
247
248 Handbook of Emergency Management Concepts
I. INTRODUCTION MATERIAL
A. Promulgation Statement
Promulgation Document
Promulgation is the process that officially announces/declares a plan (or law). The
promulgation document gives the plan official status. It gives both the authority and
the responsibility to organizations to perform their tasks.
It should also mention the responsibilities of tasked organizations with regard
to preparing and maintaining their own procedures/guidelines and commit those
organizations to carrying out the training, exercises, and plan maintenance needed
250 Handbook of Emergency Management Concepts
to support the plan. In addition, the promulgation document allows senior officials to
affirm their support for emergency management.
The Emergency Response Plan (ERP) and supporting materials, is a guide to how
the School conducts all-hazards response. To clarify, all-hazards events (please refer
to ERP Section IV: Hazard Specific Procedures) are typically associated with the
following categories:
More guidance on all-hazards planning may be found in Section IV: Hazard Specific
Procedures.
The ERP is written in support of emergency management and is built upon the
National Response Framework as scalable, flexible and adaptable coordinating struc-
tures to align key roles and responsibility. This plan and contents within shall apply
to all (add School/District name) administration, staff, and students, and others par-
ticipating in protection, prevention, mitigation, preparedness, response and recovery
efforts. Furthermore, tasked organizations supporting ERP procedures shall main-
tain their own procedures and actively participate in the training, exercise, and main-
tenance needed to support this plan.
This plan is intended to capture specific authorities and best practices for manag-
ing incidents from the serious but purely local, to large-scale community or regional
events, or catastrophic in nature.
Most emergencies follow some recognizable build-up period during which actions
can be taken to achieve an appropriate state of maximum readiness. General actions
are detailed in the appropriate sections of this document; however, it is acknowl-
edged that disasters are unique occurrences, which require specific resources
dependent upon the type, nature, and extent of the emergency. In this regard, this
document is not all-inclusive, nor does it limit or restrict reasonable or prudent
actions.
This ERP was prepared by (add School/District name) staff and approved by
senior administration, whereas enabling activities contained within this document to
be performed within the school capability.
Furthermore, this ERP has been distributed internally within the (add
School/District name) and with external agencies that may be affected by its
implementation.
School Emergency Response Plan Template 251
B. Scope
Scope
The ERP/EOP should also explicitly state the scope of emergency and
disaster response and the entities (e.g., departments, agencies, private sec-
tor, citizens) and geographic areas to which the plan applies.
It is the school’s (add staff position, or designee) that is the responsible
authority to direct the response involving an incident occurring on property,
or at any (add School/District name) event sponsored or sanctioned.
This plan and all contents contained herein shall apply to all (add School/
District name) students, faculty, staff and visitors, and others participating
in protection, prevention, mitigation, preparedness, response and recovery
efforts. An incident or event influencing (add School/District name) may
also affect the surrounding community; therefore, this plan shall support
community emergency operations and any supporting Memorandums of
Understanding (MOU) and/or Memorandums of Agreement (MOA).
The scope of the ERP applies to incidents and/or events of all sizes, includ-
ing those that exceed the school response services and capabilities that may
result in activation of the local emergency operations center. MOUs/MOAs
in coordination with additional support requested from local, State and
Federal entities may be activated.
The School ERP outlines the expectations of faculty and staff; roles and
responsibilities; direction and control systems; internal and external com-
munications; training and sustainability of the ERP; authority and ref-
erences as defined by local, State, and Federal government mandates;
common and specialized procedures; and specific hazard vulnerabilities
and response/recovery for (add School/District name).
C. Situation Overview
Situation Overview
The situation section characterizes the “planning environment,” making it
clear why an EOP is necessary. The level of detail is a matter of judgment;
some information may be limited to a few specific annexes and presented
there.
At a minimum, the situation section should summarize hazards faced by
the jurisdiction and discuss how the jurisdiction expects to receive (or pro-
vide) assistance within its regional response structures. The situation sec-
tion covers a general discussion of:
• Relative probability and impact of the hazards
• Geographic areas likely to be affected by particular hazards
• Vulnerable critical facilities (e.g., nursing homes, schools, hospitals,
infrastructure)
• Population distribution and locations, including any concentrated popu-
lations of individuals with disabilities, others with access and functional
254 Handbook of Emergency Management Concepts
• The school is dependent upon the local municipalities for fire suppres-
sion and rescue services, major hazardous material response capabilities,
EMS, bomb squad response, public health guidance, law enforcement
tactical responses, support from emergency management, and assis-
tance in emergency operations staffing. If written agreements exist, add
location of these agreements.
• The school maintains staffing resources, or has written agreements in
place, that may provide the following services: (add items such as CPR,
first aid, counseling).
The (add School/District name) has assigned the following staff, (list posi-
tion) to address emergency preparedness. In addition to supporting (add
local, private, and regional stakeholders) the school has adopted and sup-
ports FEMA emergency management practices, protection, prevention,
mitigation, preparedness, response and recovery in their planning process,
and is committed to developing and exercising plans in addition to training
and exercising with local populations.
D. Planning Assumptions
Planning Assumptions
These identify what the planning team assumes to be facts for planning
purposes in order to make it possible to execute the EOP. During opera-
tions, the assumptions indicate areas where adjustments to the plan have to
be made as the facts of the incident become known. These also provide the
opportunity to communicate the intent of senior officials regarding emer-
gency operations priorities.
The (add School/District name) ERP is based on the following planning
assumptions and considerations as presented in this section.
• Any employee of (add School/District name) may be tasked by this
ERP.
• School officials and representatives recognize their responsibilities for
the safety and well-being of students, staff, and visitors; and assume
their responsibilities in the implementation of this ERP.
• External resources may be requested to assist the school.
• In most cases, law enforcement or fire service personnel will assume
Incident Command, or establish a unified command, depending on the
type of emergency.
• Incident management activities will be initiated and conducted using
the Incident Command System, contained in the National Incident
Management System (NIMS).
• Outside assistance will likely be available in most emergencies affect-
ing the school. Although these procedures define procedures for coor-
dinating such assistance, it is essential for the school to be prepared to
carry out disaster response and short-term actions on an independent
basis, or in the event, the incident is community or region wide.
256 Handbook of Emergency Management Concepts
• It is possible for a major disaster to occur any time and any place in or
near the school. In some cases, timely dissemination of warnings and
increased readiness measures may be possible. However, many disas-
ters can, and may occur with little or no warning.
• Proper implementation and understanding of these procedures through
training and exercising will reduce or prevent disaster-related losses.
• Emergencies on the School grounds may involve multiple responding
departments and agencies including, but not limited to, local law enforce-
ment, county health department, fire services, emergency management,
environmental health and safety, emergency medical services, and appro-
priate school, city, county, state and federal agencies.
• Other schools operating on the (add School/District name) property
shall coordinate their emergency actions with this ERP. (Add other
items as applicable)
A. General
It is the responsibility of the school to protect life and property from the effects of
emergency situations within its own jurisdiction. (Add School/District name) has
the primary responsibility for initial emergency management activities. Concept of
Operations information located in this section is designed to give an overall picture
of incident management.
It will primarily clarify the purpose, and explain the school’s overall approach to
an emergency (i.e., what should happen, when, and at whose direction).
Top priorities for incident management are to:
• Protect and save lives, and protect health and safety of students, faculty,
staff, visitors, responders, and recovery workers.
• Protect property and mitigate damages and impacts to individuals, the
community, and the environment.
School Emergency Response Plan Template 257
To assist in delineating levels of response, the following terms have been pro-
vided, but it is of the utmost importance that terminology is used that is acceptable
and applicable to your individual school, district and response community.
An emergency, as used in this plan, is intended to describe a range of situations,
from an incident to a major disaster. It includes the following:
This ERP is based on the “all-hazards” concept and is flexible in that part of the plan
or the entire plan may be activated based on the specific emergency and decision by
school leadership.
The school concept of operations is that the emergency functions of various
departments and agencies involved in emergency management will generally paral-
lel normal day-to-day functions or operations.
Day-to-day functions that do not contribute directly to the emergency may be
suspended for the duration of any emergency. The efforts that would normally be
required for those functions will be redirected to the accomplishment of emergency
tasks by the school.
The (add School/District name) ERP addresses preparedness activities embedded
within the key areas of emergency planning (CPG 101 v.2, pg. 1–8).
The (add School/District name) has adopted NIMS and the use of the Incident
Command System (ICS) in accordance with the Homeland Security Presidential
Directive (HSPD) 5. Additionally, the U.S. Department of Education has pro-
vided guidance as to “key personnel,” such as executive leaders, general personnel,
Command Staff and Incident Managers, to complete specific courses in order to
meet organizational NIMS compliance.
Appropriate school staff will participate in NIMS preparedness programs, com-
munity collaboration and planning efforts, and participate in training and exercising
of the ERP’s procedures.
In a major emergency or disaster, the school may be damaged or need to be evacu-
ated, people may be injured, and/or other incident management activities may need
to be initiated. These activities will be organized and coordinated to ensure efficient
incident management. The Incident Command System (ICS), a component of NIMS,
will be used to manage all incidents and major school/district planned events. The
school ICS approach will be used in all phases of incident management, including
pre-incident activities, incident and post incident.
A. Organization
Emergency Management for (add School/District name) is comprised of the
following:
(The following are examples and should be modify as applicable to your school
or district.)
• Superintendent
• School Board President
• Other
School Emergency Response Plan Template 261
In complex incidents, the Policy Group will be convened at (add location and
alternative location). The role of the Policy Group is to:
Teachers
Teachers shall be responsible for the supervision of students and shall remain with
students until directed otherwise.
Responsibilities include:
Instructional Assistants
Responsibilities include assisting teachers as directed.
• Take steps to ensure the safety of students, staff, and other individuals in
the implementation of incident management protocols.
• Direct students in their charge according to established incident manage-
ment protocols.
• Render first aid if necessary.
• Assist in the transfer of students, staff, and other individuals when their
safety is threatened by a disaster.
• Execute assignments as directed by the Incident Commander or ICS supervisor.
Custodians/Maintenance Personnel
Responsibilities include:
• Use, prepare, and serve food and water on a rationed basis whenever the
feeding of students and staff becomes necessary during an incident.
• Execute assignments as directed by the Incident Commander or ICS
supervisor.
Transportation/Bus Drivers
Responsibilities include:
• Supervise the care of students if disaster occurs while students are in the
bus.
• Transfer students to new location when directed.
• Execute assignments as directed by the Incident Commander or ICS
supervisor.
• Transport individuals in need of medical attention.
Students
Responsibilities include:
Parents/Guardians
Responsibilities include:
A. Incident Command
Incident Command System
The Incident Command System (ICS) organizational structure develops in a top-down,
modular fashion that is based on the size and complexity of the incident, as well as the spe-
cifics of the hazard environment created by the incident. As incident complexity increases,
the organization expands from the top down as functional responsibilities are delegated.
School Emergency Response Plan Template 265
Incident Management
The school ICS may be organized into the following functional areas: provides stra-
tegic guidance and resource support.
Organization Expansion
Incident Commander
The Incident Commander (IC) is the primary person in charge at the incident and
will establish incident objectives based on the following five primary objectives:
1. Life Safety
2. Protect Public Health
3. Incident Stabilization
4. Property and Environment Preservation
5. Reduce adverse psychological consequences and disruptions
Additionally, the IC will manage the incident scene, and he or she must keep the
Executive/Senior Administration and the Policy Group informed and up to date on
important matters pertaining to the incident.
School-related responsibilities and duties include:
• The first staff person on scene, (or insert position) will assume the role of
Incident Commander until a more qualified individual can assume command.
• The Incident Commander is delegated the appropriate authority to direct
tactical on-scene operations until a coordinated incident management
framework can be established with local resources.
• Establish an Incident Command Post (ICP) and provide an assessment
of the situation to the Executive/Senior Administration, which may also
include the Policy Group or other officials, recommend incident response
activities, identify incident management resources required, and direct the
on-scene incident management activities from the ICP.
• Establish and manage the Command Post, establish the incident organiza-
tion, and determine strategies to implement protocols and adapt as needed.
• Monitor incident safety conditions and develop measures for ensuring the safety
of building occupants (including students, staff, volunteers, and responders).
• Coordinate media relations and information dissemination with the principal.
• Serve as the primary on-scene contact for outside agencies assigned to the
incident, establish unified command as necessary, develop working knowl-
edge of local/regional agencies, and assist in accessing services when the
need arises.
School Emergency Response Plan Template 267
• Document activities.
• Assume overall direction of all incident management procedures based on
actions and procedures outlined in this EOP.
• Determine whether to implement incident management protocols (e.g.,
Evacuation, Shelter in Place, Lockdown, etc.), as described more fully in
the (add location) in this document.
• Arrange for transfer of students, staff, and other individuals when safety is
threatened by a disaster.
• Work with emergency services personnel. (Depending on the incident,
community agencies such as law enforcement or fire department may have
jurisdiction for investigations, rescue procedures, etc.)
• Keep the Executive/Senior Leadership and Policy Group informed of the
situation.
Unified Command
Unified Command applies ICS to incidents involving multiple jurisdictions or agen-
cies. It enables schools and agencies with different legal, geographic, and functional
responsibilities to coordinate, plan, and interact effectively.
Additionally, the Incident Commanders within the Unified Command will make
joint decisions and speak as one voice. Any differences are worked out within the
Unified Command. Within Unified Command, law enforcement would not tell
school personnel how to manage, i.e., parent-student reunification, etc., or tell the
firefighters how to do their job.
Operations Section
The Operations Section directs all tactical operations of an incident including imple-
mentation of response/recovery activities according to established incident manage-
ment procedures and protocols, care of students, first aid, crisis intervention, search
and rescue, site security, damage assessment, evacuations, and the release of students
to parents.
Specific responsibilities include:
Planning Section
Collects, evaluates, and disseminates information needed to measure the size,
scope, and seriousness of an incident, and to plan appropriate incident management
activities.
School Emergency Response Plan Template 269
Logistics Section
Supports incident management operations by securing and providing needed person-
nel, equipment, facilities, resources, and services required for incident resolution;
coordinating personnel; assembling and deploying volunteer teams; and facilitating
communication among incident responders. This function may involve a major role
in an extended incident.
Additional responsibilities include:
Finance/Administration Section
Oversees all financial activities including purchasing necessary materials, tracking
incident costs, arranging contracts for services, timekeeping for emergency respond-
ers, submitting documentation for reimbursement, and recovering school records
following an incident.
Additional duties may include:
The Finance and Administration Section may not be established onsite at the inci-
dent. Rather, the school and school district management offices may assume respon-
sibility for these functions.
An important component of the ERP is a set of interagency agreements with
various city/county agencies to aid timely communication. These agreements help
coordinate services between the agencies and (add District name). Various agen-
cies and services include county governmental agencies such as mental health,
law enforcement, county health department, and fire departments. The agreements
specify the type of communication and services provided by one agency to another.
270 Handbook of Emergency Management Concepts
The agreements also make school personnel available beyond the school setting in
an incident or traumatic event occurring in the community.
B. Communication
Communications
This section describes the communication protocols and coordination
procedures used between response organizations during emergencies and
disasters. It discusses the framework for delivering communications sup-
port and how the jurisdiction’s communications integrate into the regional
or national disaster communications network. It does not describe com-
munications hardware or specific procedures found in departmental
SOPs/SOGs. Planners should identify and summarize separate interoper-
able communications plans. This section may be expanded as an annex
and is usually supplemented by communications SOPs/SOGs and field
guides.
Communication is a critical part of incident management. This section
outlines (add School/District name) communications plan and supports
its mission to provide clear, effective internal and external communication
between the school, staff, students, parents, responders, and media. (Add
location of communication plan, policy, and procedures.)
• Upon learning of an emergency and assessing need for local agency sup-
port such as law enforcement or fire services, (add staff positions) will
call 911.
School Emergency Response Plan Template 271
the principles of the National Incident Management System (NIMS) and Incident
Command System (ICS).
Furthermore, the ERP utilizes the Homeland Security Exercise and Evaluation
Program (HSEEP) to addresses response, training, exercises, equipment, evaluation,
and corrective action practices.
The (add school position) shall oversee or coordinate with applicable partners the
following ERP actions:
D. Record of Change
E. Record of Distribution
LOCAL
(Insert any applicable local citations)
STATE
State Revised Statutes
FEDERAL
• Robert T. Stafford Disaster Relief and Emergency Assistance
Act, PL 100-707
• Emergency Management and Assistance, Code of Federal
Regulations, Title 44
• Superfund Amendments and Reauthorization Act of 1986, PL
99-499 (Title III, “Emergency Planning and Community Right-
to-Know Act of 1986”)
• Comprehensive Environment Response Compensation and
Liability Act of 1980, PL 96510 (CERCLA or “Superfund”)
• County Health Department Security and Bioterrorism Prepared
ness and Response Act (42 CFR Part 73)
• Homeland Security Act of 2002 (CIKR, Intro-2, CPG 101)
• Homeland Security Presidential Directive (HSPD) 3, 5 and 8:
• National Response Framework
• National Incident Management Systems (NIMS)
• Occupational Safety and Health Administration (OSHA) Rule
1910.120
X. DEFINITIONS
1. Common Terminology: Using common terminology helps to define orga-
nizational functions, incident facilities, resource descriptions, and position
titles.
2. Demographic profile: Marketers typically combine several variables to
define a demographic profile. A demographic profile (often shortened to “a
demographic”) provides enough information about the typical member of
this group to create a mental picture of this hypothetical aggregate.
3. Disaster Recovery Center (DRC). The Disaster Recovery Center is estab-
lished by FEMA in partnership with state and local emergency management
offices. Representatives from federal, state, local, and volunteer agencies
are there to explain the assistance available and to assist victims in procur-
ing it.
4. Emergency Alert System (EAS). A network of broadcast stations and
interconnecting facilities which have been authorized by the Federal
Communications Commission to operate in a controlled manner during
a war, state of public peril or disaster, or other national emergency—as
provided by the emergency broadcast system plan. Supersedes EBS
(Emergency Broadcast System).
5. Emergency Management (EM). A framework for organizing and managing
emergency protection efforts. Prevention, protection, mitigation, prepared-
ness, response, and recovery—in the all-hazards approach.
School Emergency Response Plan Template 277
14. Incident Command Post (ICP). The location from which the Incident
Commander oversees all incident operations. The ICP may be located outside,
in a vehicle, trailer, or tent, or within a building. The ICP will be positioned at a
safe distance from an accident site where the incident commander, responders
and technical representatives can make response decisions, deploy man power
and equipment, maintain liaison with the media and handle communications.
15. Incident Command System (ICS). The combination of facilities, equip-
ment, personnel, procedures, and communications operating with a com-
mon organizational structure, with responsibility for the management of
assigned resources to effectively accomplish stated objectives pertaining to
an incident and/or event.
16. Continuity of Operations Plan (COOP) establishes guidance and proce-
dures to ensure the resumption of essential functions in the event that an
emergency or disruption incapacitates operations and/or requires the relo-
cation of selected personnel and functions. (See Annex A COOP.)
17. Local Emergency Planning Committee (LEPC). A group of representa-
tives of government and private industry who coordinate response plans for
emergency conditions.
18. Lockdown. A procedure of locking classroom doors, covering windows,
moving all persons away from windows and doors during a situation involv-
ing dangerous intruders, or other incidents that may result in harm to per-
sons inside the school building.
19. Liaison Officer. A member of the command staff responsible for interacting
with representatives from cooperating and assisting agencies.
20. Logistics Section. The section responsible for providing facilities, services,
and materials for the incident.
21. Material Safety Data Sheet (MSDS). Document containing specific infor-
mation on the safe handling of chemicals in the workplace.
22. National Weather Service (NWS). To provide weather and flood warnings,
public forecasts and advisories for all of the United States, its territories,
adjacent waters and ocean areas, primarily for the protection of life and
property. NWS data and products are provided to private meteorologists for
the provision of all specialized services. See: http://www.nws.noaa.gov.
23. NIMS provides a consistent framework for incident management at all
jurisdictional levels regardless of the cause, size, or complexity of the inci-
dent. NIMS is not an operational incident management or resource allo-
cation plan. NIMS represents a core set of doctrine, concepts, principles,
terminology, and organizational processes that enables effective, efficient,
and collaborative incident management.
24. Public Information Officer (PIO). A member of the command staff respon-
sible for interfacing with the media or other appropriate agencies requiring
information directly from the incident.
25. Radio Amateur Civil Emergency Service (RACES). A radio communica-
tion service conducted by volunteer licensed amateur radio operators, for
providing emergency radio communications to local, regional, or state
emergency management organizations. FCC 97.163(a).
School Emergency Response Plan Template 279
26. Resources List. A current list of all resources (equipment, personnel, sup-
plies), which can be used by emergency services in response to local disaster/
emergencies.
27. Shelter-In-Place. A procedure addressing the need to provide refuge for
students, staff and visitors within the school building during an emergency.
28. Staging Area (SA). A pre-selected location having large parking areas and
cover for equipment, vehicle operators, and other personnel such as a major
shopping area, schools, etc. The SA provides a base for coordinated emer-
gency operations, assembly of persons to be moved by public transportation
to reception jurisdictions, a rally point for mutual aid, or a debarking area
for returning evacuees.
29. Transfer of Command: The process of moving the responsibility for inci-
dent command from one Incident Commander to another is called “transfer
of command.” It should be recognized that transition of command on an
expanding incident is to be expected. It does not reflect on the competency
of the current Incident Commander.
30. Unified Command. In ICS, Unified Command is a unified team effort that
allows all agencies with responsibility for the incident, either geographi-
cal or functional, to manage an incident by establishing a common set of
incident objectives and strategies. This is accomplished without losing or
abdicating agency authority, responsibility, or accountability. The opera-
tions section chief is responsible for implementing the incident action plan.
31. Unity of Command and Chain of Command: Chain of command refers to
the orderly line of authority within the ranks of the incident management
organization. Unity of command means that every individual has a desig-
nated supervisor to whom he or she reports at the scene of the incident.
These principles clarify reporting relationships and eliminate the con-
fusion caused by multiple, conflicting directives. Incident managers at
all levels must be able to control the actions of all personnel under their
supervision.
32. Unified Command: In incidents involving multiple jurisdictions, a single
jurisdiction with multiagency involvement, or multiple jurisdictions with
multiagency involvement, Unified Command allows agencies with different
legal, geographic, and functional authorities and responsibilities to work
together effectively without affecting individual agency authority, responsi-
bility, or accountability.
1. BACKGROUND INFORMATION
2. INFORMATION SHEET (Click Link to Open)
3. WORKSHEET (Click Link to Open)
280 Handbook of Emergency Management Concepts
1. Background Information
The goal of the Information Collection, Analysis, and Dissemination section is to
gather critical information to enhance life safety, in addition to the physical resis-
tance of our school and district to man-made and natural hazards.
Furthermore, we hope to achieve integrated infrastructure protection and disaster
management, and at the same time meet the needs of the students, staff, administra-
tion, and public.
Protecting a school building and grounds from physical attack is a significant
challenge because the design, construction, renovation, operation, and maintenance
of a facility must consider numerous building users, infrastructure systems, and
building design codes and in collecting, analyzing and disseminating this informa-
tion we hope to assist you in capturing critical information that will assist school or
district staff, and first responders when responding to and recovering from an emer-
gency or disaster occurring on school property.
Schools are an integral part of every community in the United States. As of fall
2010, approximately 75.9 million people were projected as enrolled in public and
private schools at all levels including elementary, secondary, and postsecondary
degree-granting. In addition, the number of professional, administrative, and sup-
port staff employed in educational institutions was projected at 5.4 million (U.S.
Department of Education 2010).
Additionally, schools serve as resources for their communities. Many schools are
used as shelters, command centers, or meeting places in times of crisis. Schools are
also used widely for polling and voting functions. In some communities, schools
are places of health care delivery. Consequently, ensuring the safety of students, fac-
ulty, and staff in our schools, as well as the safety of the school buildings themselves,
is critically important.
Schools may or may not be the targets, but could be indirectly threatened by col-
lateral damage from an event occurring at nearby facilities.
Protecting a school against terrorist attack or active shooter is a challenging task.
A school may have considerable vulnerabilities, because of its well-defined periods
of use, designated access points, storage of sensitive personal information, minimal
security forces, and numerous avenues of penetration and escape for attackers.
More in-depth information on this topic may found in the following materials:
• Secure Strategic Plan sets the overall course and direction of Preparedness,
including the emergency management program, by defining its vision, mis-
sion, goals, and objectives.
• Emergency Operations Plan supports and includes annexes and is an all-
discipline, all-hazards plan that establishes a single, comprehensive frame-
work for the management of statewide events.
• The Critical Infrastructure Protection and Resiliency Strategic Plan sup-
ports the National Infrastructure Protection Plan (NIPP) by establishing
a coordinated approach to national priorities, goals, and requirements for
critical infrastructure and key resource protection.
• The strategic plan requires the development of sector-specific plans (SSPs)
to provide the means by which the NIPP is implemented across all critical
infrastructure and key resources sectors.
• The Hazard Mitigation Plan identifies hazards and analyzes the risk and
potential impacts. The plan focuses on reducing the long-term vulnerability
to identified hazards by establishing interim and long-term goals, objec-
tives, and actions.
• The Recovery and Mitigation Standard Operating Guide describes the
framework and associated actions to be taken in the establishment, opera-
tions, and demobilization of a joint field office and area coordinating offi-
cers, to deliver disaster assistance and support throughout all phases of
recovery in a timely and effective manner.
281
282 Handbook of Emergency Management Concepts
• The Plan for the Public Assistance Grant Program identifies the roles,
responsibilities, processes, and procedures for administering the Federal
Emergency Management Agency (FEMA) Public Assistance program.
• Other hazard-specific plans developed by individual agencies to address
specific incidents or pursuant to federal guidance.
• Agency strategic plans that focus on prioritized actions, including the func-
tions of each agency, which are critical to the emergency response and
recovery operations.
• Agency continuity plans that address an agency’s ability to continue to
provide essential government functions in the event of a disruption. Plans
include orders of succession, delegations of authority, and essential records,
systems, and equipment. They also address the procedures for restoring
essential government functions, including those that are critical to emer-
gency response and recovery operations.
Hazard
specific annexes
Support annexes
Basic plan
The diagram in Figure 17.1 demonstrates the process in which the four components
of the operation plan are activated. The Basic Plan, forming the foundation, is always
activated during an incident.
As the state’s response grows, select ESF annexes are called upon to support
specific missions. Support annexes may then be implemented to supplement actions
carried out under the Basic Plan and ESFs. Located at the top of the pyramid are
Hazard-Specific Annexes, which play an important role during the state’s response
to particular incidents. These comprehensive, incident-specific documents address
enhanced response actions not identified in the Basic Plan and underlying ESFs.
TABLE OF CONTENTS
FOREWORD i
PREFACE ii
Basic Plan
I. INTRODUCTION 1
A. Purpose 1
B. Scope and Applicability 1
284 Handbook of Emergency Management Concepts
I. INTRODUCTION
The plan provides the coordinating structures, processes, and mechanisms in a col-
lective framework for the coordination of state support to affected local govern-
ments, individuals, and businesses. It is compatible with the NRF and NDRF, and
provides the structure for coordinating with the federal government in the delivery
of federal disaster assistance. The plan supports the emergency management mission
of the Commonwealth by improving the capability to respond to and recover from
natural and human-caused disasters.
A. Purpose
The Basic Plan is the foundation of the local/state’s emergency response and recov-
ery organization. This plan identifies the role of state government and coordinating
NGOs and PSPs before, during, and after a disaster, large-scale emergency, or event
affecting the local government. It establishes the concepts and policies under which
all elements of state government and coordinating NGOs and PSPs will operate dur-
ing emergencies. It also provides the framework within which more detailed emer-
gency plans or procedures can be developed and maintained by state agencies, local
governments, NGOs, and PSPs.
To ensure the local government capability to implement this plan, each agency
tasked with essential emergency management responsibilities shall develop and
maintain response plans in support of the plan. In addition, executive branch agen-
cies and institutions of higher education are required to develop and maintain an all
hazards continuity plan that identifies the critical and time-sensitive functions, appli-
cations, and processes of the agency to be recovered and continued in an emergency
286 Handbook of Emergency Management Concepts
• Lives and protect the health and safety of the public, responders, and recov-
ery workers.
• Protect property and mitigate damages and impacts to individuals, com-
munities, and the environment.
• Protect and restore critical infrastructure and key resources. Facilitate
recovery of individuals, businesses, communities, governments, and the
environment.
• Manage public expectations regarding response and recovery activities.
This plan is applicable to all agencies of the local government, and coordinating
NGOs and PSPs that may be requested to provide assistance or conduct operations in
response to an incident or event. Depending on the severity of the incident or event,
the governor may declare an emergency or determine that state emergency manage-
ment coordination is required in order to protect or save lives, prevent or minimize
property or environmental impacts, or otherwise assist affected areas. Moreover,
this plan also provides the foundation for the organization and coordination of com-
munity recovery and mitigation activities.
D. Policies
1. The Emergency Services and Disaster Laws require the state, and each city,
county, and certain towns to establish an emergency management organiza-
tion, and develop and maintain a current EOP structured around the exist-
ing constitutional government.
2. Incidents are typically managed at the lowest possible geographic, organi-
zational, and jurisdictional level. As such, direction of emergency opera-
tions will be exercised by the level of affected local government closest to
the incident. If an incident is determined to have a terrorism nexus, appro-
priate federal agencies will likely assume direction and control of the inves-
tigation, in coordination with state and local authorities.
3. Coordination of emergency response will be accomplished within the
Incident Command System, allowing for the incorporation of local, state,
and federal agencies, and other responsible parties.
4. The provision of state assistance and the deployment of resources for emer-
gency response are dependent upon the receipt of prompt and accurate situ-
ational information from local officials. Local requests for assistance and/
or situation reports will be submitted utilizing WebEOC. If WebEOC is
unavailable, information may be transmitted via other means, such as fax,
email, telephone, or radio.
5. The Governor may issue an Executive Order declaring that a “state of emer-
gency” exists in all or a portion of the state.
6. All Executive Branch agencies (including state institutions of higher educa-
tion) are resources of the Governor, and therefore may be activated to sup-
port the emergency response plan during response or recovery activities.
7. Requests for assistance from entities including, but not necessarily limited
to, nursing homes, colleges and universities, and authorities will be submit-
ted to the local Emergency Management Coordinator in the jurisdiction in
which the entity resides.
Requests for assistance will be submitted to the local Emergency
Management Coordinator or their designee when local capabilities are
exceeded.
State or Local Emergency Response Plan Template 289
III. ORGANIZATIONAL STRUCTURE
The state provides that emergency management organizations and operations will be
structured around existing constitutional government. The Director of Emergency
Management for the state appoints a Coordinator of Emergency Management
(State Coordinator). The State Coordinator appoints the managers and coordinates
response activities. The State Coordinator also appoints the Director of Recovery and
Mitigation, who coordinates state recovery activities for a disaster that is declared
by the President as authorized by the Stafford Act. For a presidentially declared
disaster, the State Coordinator is usually designated the State Coordinating Officer
by the Governor.
The planning and coordination of state, local, and federal entities to accomplish
productive and timely recovery efforts. All agencies, NGOs, and PSPs will coordi-
nate with state coordinator to develop and maintain their designated part(s) of the
plan.
290 Handbook of Emergency Management Concepts
IV. CONCEPT OF OPERATIONS
This section describes the state emergency management coordinating structures,
processes, and protocols employed for incident management. These coordinating
structures and processes are designed to enable execution of the responsibilities
of the Governor through the appropriate state agencies. It integrates federal, state,
local, NGOs and PSPs efforts into a comprehensive statewide approach to incident
management.
The state plan and local emergency operations plans are founded upon the
concept that emergency operations begin at the jurisdiction level closest to the
event, and are managed by local police, fire, emergency medical and health,
emergency management, and other response personnel. In the vast majority of
disasters, local resources will operate under the umbrella of a mutual aid agree-
ment or compact to provide the first line of emergency response and incident
management support. In some instances, a state or federal agency with princi-
pal activities or facilities in a local area may act as a first responder and may
provide direction or assistance consistent with its specific statutory authorities
and responsibilities. State assistance will be provided upon request when needs
exceed local capabilities.
Situations in which several localities are threatened or affected concurrently may
involve the state from the onset. If the state capabilities are exceeded, the Governor
may request federal assistance. At each level, the government should officially
declare a ‘state of emergency’ to exist in order to request assistance. A local emer-
gency declaration indicates that local resources capable of handling the situation
are fully committed before state assistance is requested. Likewise, state resources
should be fully committed before federal assistance is requested. Exceptions are
made to these procedures when localities request state assistance with search and
rescue or hazardous materials response.
The EOC has four operational levels:
A. Notification
State agencies, local governments, NGOs, and PSPs report threats, incidents, and
potential incidents using established communications and reporting channels.
The Fusion Center receive threat and operational information regarding incidents
or potential incidents, and then makes an initial determination to implement Federal
information sharing and incident management protocols.
• Public Announcements
• Social Media
• Watches and Warnings
• Emergency Alert System (EAS)
• Other Emergency Bulletins
State or Local Emergency Response Plan Template 293
D. Response Actions
At the request of local governments, the ERT directs state response activities that
address the short-term direct effects of an incident. These activities include immedi-
ate actions to preserve life, property, and the environment, meet basic human needs,
and maintain the social, economic, and political structure of the affected community.
As part of an effective response, the ERT must continuously refine its ability to
assess the situation as an incident unfolds and rapidly provide accurate and accessi-
ble information to decision makers. This is accomplished by maintaining situational
awareness and a common operating picture through receipt of prompt and accurate
information from affected localities using established reporting mechanisms.
Response actions may include the following resources and/or elements:
• Law enforcement
• Fire and emergency medical services
• Evacuation and transportation management
• Emergency public information or other actions taken to minimize addi-
tional damage
• Urban search and rescue services
• Deployment of advance teams to assess the severity of impact and expedite
the delivery of state resources
• Establishment of mass care facilities, including shelters and feeding operations
294 Handbook of Emergency Management Concepts
G. Recovery Actions
Recovery involves actions needed to assist individuals and communities in returning
to pre-incident conditions when feasible, as well as mitigating the potential impacts
of future events. The state joins with federal agencies to establish a JFO that serves
as the central coordination point among federal, state, local and voluntary organiza-
tions for delivering recovery assistance programs. ESF #14 and the ECSF will be
the organizational framework used to plan, implement, and coordinate the incident
specific short, interim, and long-term components of recovery. The ECSF will focus
primarily on the long-term phase and be organized in the context of the Recovery
Support Functions described in NDRF.
Recovery actions typically include direct financial assistance to eligible individu-
als who have lost residential dwellings or personal property, the coordination and
execution of service and site restoration plans, and the reconstitution of state and
local government operations and services through private sector, non-governmental,
and public assistance programs.
The Hazard Mitigation Grant Program is a component of the Public Assistance
Program, and is also implemented statewide, based on a strategy designed to miti-
gate future damage throughout the state.
Short-Term Recovery
The short-term component of the recovery process supports a variety of activities,
including reviewing and assessing IDA’s, recommending, arranging, and support-
ing PDAs, developing the request for a federal declaration, and if the declaration
request is approved, establishing a JFO with FEMA. The JFO focuses primarily
on the delivery of disaster assistance programs authorized by The Stafford Act, the
management of the cost reimbursement process, and the coordination of available
296 Handbook of Emergency Management Concepts
resources and support from local, state, federal, and non-governmental organiza-
tions, as well as the private sector.
Long-Term Recovery
The long-term recovery component of ESF #14 will assess the severity of impacts
on the community, and begin defining the anticipated long-term recovery needs
and resource requirements. The assessment associated with the long-term phase is
broader in scope and focuses on the social and economic impact to the community
and associated infrastructure.
Factors that are considered in this process include:
• Impacts on the housing sector and the projected number of displaced per-
sons on a long-term basis.
• The severity and scope of the infrastructure damage precipitating major
service and economic disruptions, and impacting negatively on overall
response and recovery operations.
• Impacts on key sectors of the communities’ economic base.
Based on the initial assessment of long-term recovery needs and resource require-
ments, and following consultation with the appropriate state officials and support
agencies, the ESF #14 long-term recovery team will make a recommendation with
regard to activating the ECSF. The ECSF will begin developing the necessary plans,
priorities, initiatives and assistance to address the long-term recovery issues identi-
fied. The long-term recovery liaison team will continue to interface and coordinate
with the short-term recovery component until the housing and associated issues of
the shelter population have been addressed. The ECSF will support and be repre-
sented in the JFO as required and continue to support long-term recovery processes
until objectives have been fulfilled.
H. Mitigation Actions
DEM maintains the state Hazard Mitigation Plan separate from the plan due to the
federally mandated content and a separate review schedule. The goal of this plan is
State or Local Emergency Response Plan Template 297
Direct agency area supervisors (from applicable division, district, or local offices)
to participate in the local emergency planning process and become a part of the local
emergency response organization, as appropriate.
B. Local Government
The state code designates powers and duties for emergency management to political
subdivisions (summarized below). Each jurisdiction:
TABLE 17.1
Affected Organization or Infrastructure
Organization Role
Affected Organization Private-sector organizations may be affected by direct or indirect
or Infrastructure consequences of the incident. These include privately owned critical
infrastructure, key resources, and other private sector entities that are
significant to local, regional, and national economic recovery from the
incident. Examples of privately owned infrastructure include transportation,
telecommunications, private utilities, financial institutions, and hospitals.
Critical infrastructure and key resources are grouped into 18 sectors that
together provide essential functions and services supporting various aspects of
the state government, economy, and society. Homeland Security Presidential
Directive 7 establishes a national policy for Federal departments and agencies
to identify and prioritize critical infrastructure and to protect them from
terrorist attacks. The directive defines relevant terms and delivers 31 policy
statements. These policy statements define what the directive covers and
the roles various federal, state, and local agencies will play in carrying
it out.
Response Resource Private-sector entities provide response resources (donated or compensated)
during an incident, including specialized teams, essential services,
equipment, and advanced technologies through local public-private
emergency plans or mutual aid and assistance agreements, or in response to
requests from government and non-governmental volunteer initiatives.
Regulated and/or Owners/operators of certain regulated facilities or hazardous operations may
Responsible Party be legally responsible for preparing for and preventing incidents from
occurring and responding to an incident once it occurs. For example,
Federal regulations require owners/operators of nuclear power plants to
maintain emergency plans and facilities, and to perform assessments,
prompt notifications, and training for response to an incident.
State/Local Emergency Private-sector organizations may serve as an active partner in local and state
Organization Member emergency preparedness and response organizations, planning, and
activities.
Components of the As the key element of the state economy, private-sector resilience and
State Economy continuity of operations planning, as well as recovery and restoration from
an actual incident, represent essential emergency management activities.
The following entities are critical to the state’s preparedness efforts to include the
development and maintenance of this plan:
B. EOP Maintenance
DEM is responsible for maintaining the EOP. The EOP is continually reviewed
and periodically updated as required to incorporate federal policy changes, guber-
natorial directives, legislative changes, and operational changes based on lessons
learned from exercises and actual events. The EOP will be reviewed and adopted in
its entirety by the Governor at least every four years. This section outlines protocols
for interim changes and full updates of the EOP. An EOP Management Standard
Operating Procedure has been adopted to further define these protocols. Changes
include additions of new or supplementary material and deletions. No proposed
change should contradict or override authorities or other plans.
Any agency or coordinating NGO or PSP may propose and develop a change
to the EOP. DEM is responsible for coordinating review of the proposed change
among the lead and support agencies, NGOs, and PSPs of each affected ESF and any
associated agency program areas as required. If DEM identifies planning needs that
require immediate resolution, or at the request of a state agency, DEM may convene
an EOP Plan Committee and revise areas of the plan identified by the committee.
Interim changes to the EOP that are administrative in nature may be approved by
the State Coordinator, however major revisions or full updates will be sent to the
Secretary of Public Safety and Homeland Security for review and concurrence prior
to submitting the plan to the Governor for approval.
After receiving approval by the Governor, full updates will be promulgated by
Executive Order.
304 Handbook of Emergency Management Concepts
• Obtaining the official approval for the change from the appropriate officials
of the affected agencies, NGOs, and PSPs.
• A process to notify and receive approval from the Governor or his/her des-
ignee for all requested changes.
• Ensure appropriate notification is made about the changes and maintain a
record of changes.
E. Plan Implementation
This plan is effective for execution upon and pursuant to the Executive Order pro-
mulgating the same. The State Coordinator will ensure that this document is subject
State or Local Emergency Response Plan Template 305
• Authorities
• Emergency Services and Disaster Laws References
• The Stafford Act
• National Incident Management System
• National Response Framework
• National Disaster Recovery Framework
• EMAP Standards (2013): 3.1.2, 4.6.1, 4.6.2, 4.6.3, 4.10.1, 4.10.5, 4.14.3
http://taylorandfrancis.com
18 Indian Ocean Tsunami
2004 Case Study
On December 26, 2004, there was a massive and sudden movement of the Earth’s
crust under the Indian Ocean. This earthquake was recorded at magnitude 9 on the
Richter scale and, as it happened under the ocean, caused a devastating sea wave
called a tsunami.
The epicenter of the earthquake occurred 200 km west of the island of Sumatra
in the Indian Ocean. The earthquake itself happened due to the subduction of the
Indo-Australian plate under the Eurasian plate. As the Indian plate (part of the Indo-
Australian plate) moved underneath the Burma plate (part of the Eurasian plate), the
crustal rocks stuck as they moved past one another. At 8 a.m. local time, the pressure
build up was too great and the crustal rocks snapped, causing an earthquake. When
this happened, the sea floor was pushed upward, displacing a huge volume of water
and creating the devastating Tsunami waves.
People
Approximately 250,000 people are estimated to have been killed including many
tourists on the beaches of Thailand.
307
308 Handbook of Emergency Management Concepts
previous earthquakes. As a result, active earthquake zones are closely monitored for
seismic activity, including the use of tilt meters and laser equipment to measure earth
movements and sophisticated sound recording equipment to monitor earth tremors.
In developed countries such as the United States, building earthquake-proof
buildings, such as the Transamerica Pyramid in San Francisco, which sways with
the movement of the earth, has helped to reduce the damage caused by earthquakes.
Some countries practice earthquake drills, e.g., Tokyo in Japan, just as we have fire
drills and emergency services are better prepared and equipped to deal with such a
disaster.
Despite all of these measures, there were few warnings or successful predictions
of the Indian Ocean Tsunami. Most of the countries affected were developing coun-
tries without the funds for these sophisticated methods of detection.
They also lacked the improved communications, which may have allowed them
to evacuate from coastal areas in time. All the warning they received was the retreat
of sea water from beaches before the wave hit.
Long-Term Aid
• Roads, electricity supplies, water pipes, etc., needed to be rebuilt.
• Houses and other buildings such as schools and hospitals needed rebuilding.
• Flood prevention measures such as sea walls to be built.
Effectiveness
• There was still a huge loss of life.
• The tourist industry, which was a large source of income, particularly to
Thailand and Sri Lanka, was up and running again after only a few months.
• Warning through media saved lives in areas such as East Africa.
Indian Ocean Tsunami 2004 Case Study 309
• Money was raised initially through TV campaigns, but this dried up once
the tsunami was no longer in the news.
• Potential corruption and stories of aid not reaching victims of the disaster
INTRODUCTION
Tsunami is a series of ocean waves typically caused by large undersea earthquakes
or volcano eruptions at tectonic plate boundaries. These surges of water may reach
100 feet and cause widespread destruction when they crash ashore. They race across
the sea at a speed up to 500 miles per hour and cross the entire Pacific Ocean in less
than one day. Their long wavelength means that they lose very little energy along
the way.
The tsunami of December 2004, caused by a 9.0-magnitude earthquake, is the
most infamous tsunami of modern times with disastrous consequences in many areas:
2. Furthermore, these regions are at risk from the devastating effects of future
tsunami due to the presence of a tectonic interactive plate.
3. The absence of a tsunami warning system in the Indian Ocean and lack of
established communication network providing timely information to that
region.
National Level
This national response plan was developed by Indian in 2006 and is the most exhaustive
of all the other national plans and should serve as a model for other islands (National
Response Plan, https://fas.org/irp/agency/dhs/nrp.pdf). It includes five objectives:
Regional Level
Disaster management is a regional priority in the Indian Ocean due to permanent
threat of cyclones, floods, and tsunamis. The stated two goals set by a series of
regional meetings in 2005 and 2006 are the following:
The important issues are the cost of establishing such a warning system in the
Indian Ocean, the transfer of existing technology versus improving an old one,
global warming, and extreme weather events in that region.
International Level
A series of international meetings have been convened to discuss the role interna-
tional organizations (United Nations Educational, Scientific and Cultural, https://
sustainabledevelopment.un.org/content/documents/index.php?):
CONCLUSION
The 2004 tsunami on the islands bordering the Indian Ocean and the lessons learned
from this event from national, regional, and international organizations to prevent
such events from occurring again in the future are discussed.
A tsunami is an ever-present and real threat for the islands of the Indian Ocean
due to the presence of a tectonic interactive plate.
312 Handbook of Emergency Management Concepts
ECONOMIC IMPACT
• The government asked for $20 billion in damages from British Petroleum
(BP) and BP’s share price fell. Local industries, such as fishing, were threat-
ened. There was a ban on fishing in the water.
• Tourism declined.
ENVIRONMENTAL IMPACT
Gulf of Mexico oil spill rescue, 2010
The size of the oil spill was one of the largest America had seen. However,
because the oil entered warm waters, organisms in the water helped to breakdown
the oil. The overall effect may be less than the Exxon Valdez Oil spill in 1989, which
happened in colder water (Figure 19.1).
The cause and effects of the oil spill were immense, and the massive damage to
the wetlands expanded the dead zones, killing off marine mammals and blobs of
oil coating deep-sea coral and causing illness in dolphins. Immersed underwater
plumes of dissolved oil tar balls, also found in fishing nets.
The British multinational oil and gas company BP headquartered in London in
the United Kingdom owned Deepwater Horizon, which experienced the oil spill in
the Gulf of Mexico near Mississippi River Delta in the United States. At approxi-
mately 9:45 p.m. on April 20, 2010, an explosion occurred, causing a massive oil
spill in the Gulf.
313
314 Handbook of Emergency Management Concepts
Mississippi Alabama
Mobile
Louisiana Biloxi Pensacola
Gulfport Pascagoula Florida
New Orleans
Venice
Incident site
The spill caused 4,200 square miles (11,000 km²) of the Gulf to close due to the mas-
sive oil spill and the time it took to clean it up.
In the efforts to clean the spill up and monitor its effects:
• BP made use of skimmers to clean up the oil spill. They also tested the
new gigantic oil skimmer called “the Whale,” which can clean up a large
quantity of water.
• They gave money to people who lost their livelihood, as reparation for
the spill, and they looked forward to finding solutions to avoid similar
spills.
• BP was still paying for commercials encouraging toursim to the Gulf of
Mexico as late as 2012, two years after the disaster.
• BP aims to maintain readiness to respond on a global scale, to minimize
adverse effects and facilitate rapid mitigation activities. Some companies
from the United States helped in the cleanup process of some affected ani-
mals, e.g., Dawn (dishwashing soap company). Local birds and animals were
muddied in toxic sludge. Volunteers and rescue used a common household
ingredient to clean up the oil-coated wildlife—Dawn dishwashing liquid.
• People across the United States were ready to dedicate their time and ideas
to clean up the oil at the coasts. They cleaned up the Gulf Coast, and they
had crews cleaning up the beaches, as well as skilled workers taking care
of animals.
Gulf of Mexico Oil Spill and BP Case Study 315
• The U.S. Coast Guard also set up a base in St. Petersburg, Florida, to track
and coordinate cleanup efforts for any spilled oil that touches the state’s
west coast.
Three critical issues as having relevance to efforts to strengthen its oil spill pre-
vention, preparedness, and response system are the following:
Like many states around the nation, the question is often asked here—how pre-
pared is Washington for a catastrophic spill? The reality here and around the nation
is that no matter how well prepared we are for spills, we fight a losing battle from the
start and we have to rely on other regions to assist in our response and recovery to a
Spill of National Significance.
Recognizing that preparedness is a continuous cycle, we must put in place now
the mechanism and processes to the following:
• Address the risk of oil spills and shift priorities as that risk evolves.
• Analyze the adequacy of and access to appropriate response equipment.
• Continuously find and fix the weak areas of the system through testing of
plans.
316 Handbook of Emergency Management Concepts
There are operational risks inherent in oil transportation and refining activi-
ties taking place on our state waters and lands. Preventing large and small spills
is Washington’s top priority and a legislative goal (“zero spills”). Meeting this goal
requires the EPA agency to identify industry-specific risks at every level in marine
transportation and oil handling systems and to target those risks with the right pre-
vention activities.
Key prevention issues, such as fatigue, inadequate crewing requirements and
inadequate company training, operating procedures, and policies continue to be
prominent causal factors in these incidents. Ecologists must continue working
with industry partners to emphasize human factors as the key to spill preven-
tion. The data also indicate that incidents from nonregulated sources, such as
fishing and recreational vessels, pose a disproportionate risk of incidents and
spills.
Recommendations
• Complete a rigorous risk analysis on higher-risk industry sectors to ensure
that there is an appropriate level of investment reducing the risk of oil
spills. Target our spill prevention education, grant assistance, inspec-
tion, and regulatory activities based on the risks presented by the various
sectors.
• Complete an analysis of U.S. Coast Guard (USCG) and Ecology tug/
oil barge incident data. This industry sector appears to have a relatively
high risk of towing incidents in which the oil barges contain millions
of gallons.
• Expand vessel inspection activities of regulated fishing vessels and ensure
that nonregulated fishing vessels receive voluntary pollution control techni-
cal assistance.
• Continue to seek opportunities to influence federal standards relating to
these risk factors. Seek formal or informal delegation from the USCG of
some activities where the agencies have concurrent jurisdiction and pro-
gram missions.
Gulf of Mexico Oil Spill and BP Case Study 317
Recommendations
• Once the Pacific States/British Columbia Oil Spill Task Force report is
issued, response agencies in the Trans-boundary area should develop and
implement an action plan around the findings in the Tran’s boundary Spill
Planning and Response Issues report.
• The Joint Response Teams should work quickly to resolve gaps in coordi-
nation mechanisms and adopt consistent policies and processes to manage
cross-border spills.
The VOO Program offers assistance in many response activities, including the
following:
There are many viable advantages to using vessels of opportunity, such as access-
ing local knowledge of waterways and environmental conditions. It also offers
employment opportunities for an economic sector that may be severely impacted by
oil spills.
The reality of the Gulf oil spill is that as long as we are dependent on oil as our
main energy resource, we are required and obligated to ensure that oil exploration
and refining and transport of petroleum are safe and our environment and economy
are protected from oil spills.
The Gulf area is heavily dependent on maritime commerce, the marine environ-
ment, and the continued recovery and restoration of the Gulf are key elements of its
economic engine. It is recognized that implementing some of these recommenda-
tions may be challenging in the state’s current economic environment.
However, it is critical that our state make appropriate investments now to ensure
that we protect the state’s future economic interests against major oil spills.
The recommendations outlined in this report promise effective protections
to avert or mitigate damages from a major oil spill and avoid the potential of an
environmental disaster that would threaten our economy, our environment, and our
region’s quality of life.
http://taylorandfrancis.com
Appendix A: Terms
and Definitions
Terms and definitions in the Federal Response Plan generally are consistent with
current terminology used in the emergency management community. A number of
these terms are defined below. Others are defined in the Basic Plan and individual
annexes. Many of these terms are cross-referenced in this appendix.
LIST OF TERMS
Accountable Property: Action Plan. See ESF 5.
Aerial Port of Debarkation: See ESF 9.
Aerial Port of Embarkation: See ESF 9.
After-Action Report
Asset Visibility
Assets
Base Support Installation: See ESF 9.
Biological Agents
Catastrophic Disaster Response Group (CDRG)
Chemical Agents
Civil Air Patrol (CAP): See ESF 5.
Civil Transportation Capacity: See ESF 1.
Comprehensive Environmental Response, Compensation, and Liability Act
(CERCLA): See ESF 10.
Congressional Affairs Representative (CAR)
Congressional Relations Officer (CRO)
Consequence Management
Contingency Plan: See ESF 5.
Credible Threat
Crisis Management
Defense Coordinating Officer (DCO)
Designated Agency Safety and Health Official (DASHO)
Disaster Field Office (DFO)
Disaster Finance Center (DFC)
Disaster Information Systems Clearinghouse (DISC)
Disaster Medical Assistance Team (DMAT): See ESFs 8 and 9.
Disaster Mortuary Team (DMORT): See ESF 8.
Disaster Recovery Center (DRC)
Disaster Recovery Manager (DRM)
Disaster Response Support Facility (DRSF)
Disaster Safety Officer (DSO)
321
322 Appendix A
DEFINITIONS
Agency Logistics Center (ALC): See Logistics Management Support Annex.
Assembly Point: A designated location for responders to meet, organize, and prepare
their equipment prior to moving to the point of departure. Since emergency
teams, organizations, and resources involved in a disaster or emergency can
originate from a variety of geographic locations, each typically has its own
assembly point.
Base Camp: The designated location under local or state control within the disaster
area that is equipped and staffed to provide sleeping facilities, food, water,
and sanitary services to response personnel.
Designated Area: The geographic area designated under a Presidential major disas-
ter declaration that is eligible to receive disaster assistance in accordance
with the provisions of the Stafford Act.
Direct Federal Assistance: Is provided to the affected state and local jurisdictions
when they lack the resources to provide specific types of disaster assis-
tance either because of the specialized nature of the assistance or because
of resource shortfalls (e.g., providing debris removal, potable water, emer-
gency medical services, and urban search and rescue).
Emergency: As defined in the Stafford Act, an emergency is any occasion or
instance for which, in the determination of the president, Federal assistance
is needed to supplement state and local efforts and capabilities to save lives
and to protect property, public health, and safety and includes emergencies
other than natural disasters.
Federal Operations Support: Is available to FEMA or other Federal responding
agencies when they require logistical or technical support of their Federal
operations—ESF activation, personnel for preparing damage survey reports,
supplies, and equipment for DFO and DRC operations.
Major Disaster: As defined under the Stafford Act, any natural catastrophe (includ-
ing any hurricane, tornado, storm, high water, wind-driven water, tidal
wave, tsunami, earthquake, volcanic eruption, landslide, mudslide, snow-
storm, or drought), or, regardless of cause, any fire, flood, or explosion,
in any part of the United States, which in the determination of the presi-
dent causes damage of sufficient severity and magnitude to warrant major
disaster assistance under this act to supplement the efforts and available
resources of states, local governments, and disaster relief organizations in
alleviating the damage, loss, hardship, or suffering caused thereby.
Mitigation: Those activities designed to alleviate the effects of a major disaster
or emergency or long-term activities to minimize the potentially adverse
effects of future disaster in affected areas.
Point of Arrival (POA): The designated location (typically an airport) within or near
the disaster-affected area where newly arriving staff, supplies, and equip-
ment are initially directed. Upon arrival, personnel and other resources
are dispatched to either the DFO, a mobilization center, a staging area, or
directly to a disaster site.
Appendix A 325
327
328 Appendix B
• ESF1 Transportation
• ESF2 Communications
• ESF3 Public Works and Engineering
• ESF4 Firefighting
• ESF5 Emergency Management
• ESF6 Mass Care, Housing, and Human Services
• ESF7 Resources Support
• ESF8 Public Health and Medical Services
• ESF9 Urban Search and Rescue
• ESF10 Oil and Hazardous Materials Response
• ESF11 Agriculture and Natural Resources
• ESF12 Energy
• ESF13 Public Safety and Security
• ESF14 Long-term Community Recovery and Mitigation
• ESF15 External Affairs
ESF 1—Transportation
• ESF Coordinator: Department of Transportation
• Aviation/airspace management and control
• Transportation safety
• Restoration and recovery of transportation infrastructure
• Movement restrictions
• Damage and impact assessment
335
336 Emergency Support Functions and Emergency Management Planning
ESF 2—Communications
• ESF Coordinator: Department of Homeland Security (DHS) (National
Communications System)
• Coordination with telecommunications and information technology industries
• Restoration and repair of telecommunications infrastructure
• Protection, restoration, and sustainment of national cyber and information
technology resources
• Oversight of communications within the Federal incident management and
response structures
ESF 4—Firefighting
• ESF Coordinator: Department of Agriculture (U.S. Forest Service)
• Coordination of Federal firefighting activities
• Support to wildland, rural, and urban firefighting operations
ESF 12—Energy
• ESF Coordinator: Department of Energy
• Energy infrastructure assessment, repair, and restoration
• Energy industry utilities coordination
• Energy forecast
• The Guide furthers the objectives of the EM and, together with the
Federal Policy for Emergency Management, serves to assist in strength-
ening resiliency by promoting a coordinated approach and a more uni-
form structure across federal/state/local government institutions.
• Its purpose is to assist all federal/state/local institutions in meeting their
responsibilities to identify the risks that are within or related to their area
of responsibility—including those related to critical infrastructure—and
to provide those institutions with a step-by-step approach to develop
their all-hazards Strategic Emergency Management Plans (SEMP).
4. What is the planning premise of EM planning?
• EM planning should be based on all four pillars of EM and a compre-
hensive All-Hazards Risk Assessment.
5. What are the “4 pillars” of EM?
1. Prevention and mitigation: Prevention and mitigation refers to actions
taken to identify and reduce the impacts and risks of hazards before an
emergency or disaster occurs.
2. Preparedness: Preparedness increases the ability to respond quickly
and effectively to emergencies and to recover more quickly from their
long-term effects and involves actions taken prior to an event to ensure
the capability and capacity to respond.
3. Response: Response refers to actions taken during or immediately after
an emergency or disaster for the purpose of managing the consequences.
4. Recovery: Recovery refers to actions taken after an emergency or disas-
ter to reestablish or rebuild conditions and services.
6. When should I begin EM planning?
• Optimally, the timing for EM planning would correspond with the
environmental-related risk assessment activities.
• Your SEMP should be linked to your EM planning and reflective of
your established priorities.
7. What is a SEMP?
• A SEMP establishes a federal/state/local government institution’s
objectives, approach, and structure that set out how the institution will
assist the coordinated federal emergency response and should, if appli-
cable, include any Emergency Support Functions.
• EM plans, such as the SEMP, represent an institution’s planning associ-
ated with its “external” environment.
• The qualifier “Strategic” is used to differentiate this high-level plan
from other types of EM plans, including operational plans. The devel-
opment and implementation of a SEMP are important complements to
other types of EM plans because it promotes an integrated and coordi-
nated approach to EM planning.
8. Are there other types of EM plans?
Yes. There are several different types of EM plans:
• Operational Plans
• Response Plans
340 Emergency Support Functions and Emergency Management Planning
343
344 References
Morgan, O.W., Sribanditmongkol, P., Perera, C., Sulasmi, Y., and Van Alphen, D. Mass
Fatality Management Following the South Asian Tsunami Disaster: Case Studies in
Thailand, Indonesia, and Sri Lanka. San Francisco, CA: PLOS, 2006.
Morgan, O.W., Sribanditmongkol, P., Perera, C., Sulasmi, Y., and Van Alphen, D. Mass
Fatality Management Following the South Asian Tsunami Disaster. PLoS Med, 2006.
Mughal, Yakub. A Worthy Successor to the Quaid. Karachi: Royal Book Company, 2012.
NACCHO. Managing Mass Fatalities: A Toolkit for Planning. National Association of
County & City Health Officials: http://archived.naccho.org/toolbox/tool.cfm?id=1595
%20. December 5, 2016.
NACCHO. Toolbox a Free Collection of Local Public Health Tools. Retrieved from NACCHO:
http://toolbox.naccho.org/pages/index.html. January 5, 2017.
Nasheri, Hedieh. Economic Espionage and Industrial Spying. New York: Cambridge
University Press, 2005.
National Association of Medical Examiners. Mass Fatality Plan. Bethesda, MD: National
Association of Medical Examiners, 2005.
National Disaster Medical System. DMORT National Disaster Medical System. Washington,
DC: U.S. Department of Health and Human Services, 2016.
National Incident Management. National Incident System Management. Washington, DC:
FEMA, 2008.
National Security Council. The Administration • National Security Council. Washington,
DC: National Security Council, 2016.
Nemth, Charles. Homeland Security Introduction to Principles and Practices (2nd ed.). Baton
Rouge, LA: CRC Press, 2013.
New Zealand Department of Internal Affairs. National Civil Defence Emergency Management
Strategy. Wellington, New Zealand: New Zealand Department of Internal Affairs, 2008.
Niska, Richard W., and Iris M. Shimizu. Hospital Preparedness for Emergency Response:
United States. Washington, DC: National Health Statistics Reports, 2008.
Occupational Safety and Health Administration. “Hazardous Waste Operations and
Emergency Response (HAZWOPER).” OSHA (2006), 29 CFR 1910.120.
OSR Journal of Business and Management. “Risk Management—An Analytical Study.” OSR
Journal of Business and Management (2014): 8.
preventwmd.org. Prevention of Weapons of Mass Destruction Proliferation and Terrorism.
http://preventwmd.org/. January 22, 2017.
QuickSeries. Incident Command System (ICS). Jefferson City, MO: QuickSeries, 2008.
Ralph, Tom. 2016 Disaster Resource Guide.” Internal Revenue Service, October 11, 2016.
Renfroe, Nancy A. Threat/Vulnerability Assessments and Risk Analysis. Washington DC:
National Institute of Building Sciences, 2016.
Renfroe, Nancy A., and Joseph L. Smith, PSP. Threat/Vulnerability Assessments and Risk
Analysis. Washington, DC: National Institute of Building Sciences, 2014.
Revolvy. Chinese Information Operations. Chinese Information Operations and Information
Warfare: http://chinawatchcanada.blogspot.com/2017/08/chinese-intelligence-worldwide
-remains.html. 2017.
Reynolds, Lori E. Cyberspace. Retrieved from Marine Corps Cyberspace Command: https://
www.revolvy.com/topic/Cyberspace&item_type=topic. November 5, 2016.
Rodin, David. War, Torture and Terrorism: Ethics and War in the 21st Century (1st ed.).
Hoboken: Blackwell Publishing, 2007.
Ronfeldt, Arquilla. “Cyberwar Is Coming.” Journal of Comparative Strategy (n.d.): 12.
Ropeik, David. Risk. New York: Houghton Mifflin Company, 2002.
Royal Cornwall Hospitals. Royal Cornwall Hospitals NHS Trust: Decontamination. London:
Royal Cornwall Hospitals, 2012.
Rudolph, Barbara. “Coping With Catastrophe.” Time. February 24, 1986.
References 347
Sanders, Mick J. et al. Mosby’s Paramedic Textbook. Sudbury, MA: Jones & Bartlett
Publishers, 2011.
Sandman, Peter M. The Role of Apologizing in Crisis Situations. http://www.psandman.com
/articles/busters.htm. June 28, 2005.
Schmid, Alex. Political Terrorism: A Research Guide to Concept, Theories, Data Bases and
Literature. London: Elsevier Science Ltd, 1983.
Sensagent Corporation. The Alexander Litvinenko Poisoning. Nuclear terrorism. http://
dictionary.sensagent.com/Nuclear%20terrorism/en-en/. November 20, 2016.
Sensagent. Cyberwarfare. http://dictionary.sensagent.com/Cyberwarfare/en-en/. October 20,
2016.
SIDS of the Pacific. The Environmental Vulnerability Index. http://www.vulnerabilityindex
.net/. March 10, 2015.
Smith, Keith. Environmental Hazards: Assessing Risk and Reducing Disaster. New York:
Routledge, 2001.
Soble, Jonathan. Fukushima Keeps Fighting Radioactive Tide 5 Years After Disaster. New
York: New York Times, 2016.
Strate, Lance. “The varieties of cyberspace: Problems in definition and delimitation.” Western
Journal of Communication (1999): 382–383.
Strumfels, David. Weapon of Mass Destruction. New York: Science/Computing Gourmet, 2015.
Talbot, Julian, and Miles Jakeman. Security Risk Management Body of Knowledge. Hoboken,
NJ: John Wiley & Sons, 2009.
Taylor, Craig, and Erik VanMarcke. Acceptable Risk Processes: Lifelines and Natural
Hazards. Reston, VA: American Society of Civil Engineers, 2002.
Taylor, Penny. “Transporting and Disposing of Dangerous Goods in the US: What You Need
to Know.” National Chemical Emergency Centre, 2015.
The Committee of Sponsoring Organizations of the Treadway Commission. Enterprise Risk
Management — Integrated Framework. Retrieved from The Committee of Sponsoring
Organizations of the Treadway Commission: https://www.coso.org/Pages/erm-integrated
framework.aspx. January 10, 2017.
The National Strategy to Secure Cyberspace. Washington, DC: Office of Homeland Security, 2003.
The Open Group. Risk Taxonomy. Berkshire: The Open Group, 2009.
Transportation Security Administration. Surface Transportation Vulnerability Assessments
and Security Plans (VASP). Federal Register. https://www.federalregister.gov/docu
ments/2016/12/16/2016-28300/surface-transportation-vulnerability-assessments-and
-security-plans-vasp. December 16, 2016.
Traynor, Ian. Angela Merkel: NSA Spying on Allies Is Not On. New York: The Guardian,
2013.
Trunkey, Donald. Current Therapy of Trauma and Surgical Critical Care (1st ed.). Philadelphia:
Mosby, 2008.
UNDRO. Case Study: Town Relocation, disasterassessment.org/documents/. 1982.
United Nations. 50/53. Measures to Eliminate International Terrorism. January 29, 1996.
Resolution adopted by the General Assembly. http://www.un.org/documents/ga/res/50
/ares50-53.htm.
United Nations. Small Arms Conference Urged to Forge Comprehensive Action Plan. New
York: United Nations Conference on the Illicit Trade in Small Arms, 2001.
U.S. Army. FM 3-11.4 Multiservice Tactics, Techniques, and Procedures for Nuclear,
Biological, and Chemical (NBC) Protection. Washington, DC: U.S. Army, 2003.
U.S. Army. FM 3-11.9 Potential Military Chemical/Biological Agents and Compounds.
Washington, DC: U.S. Army, 2005.
U.S. Army. Defense Support of Civil Authorities. Washington, DC: U.S. Army Training and
Doctrine Command, 2005.
348 References
U.S. Army. FM 3-11.3 Multiservice Tactics, Techniques, and Procedures for Chemical,
Biological, Radiological, and Nuclear Contamination Avoidance. Washington, DC:
U.S. Army, 2006.
U.S. Army. FM 3-11.5 Multiservice Tactics, Techniques, and Procedures for Chemical,
Biological, Radiological, and Nuclear Decontamination. Washington, DC: U.S. Army,
2006.
U.S. Army. Composite Risk Management Process. http://www.wv.ngb.army.mil/camp
dawson/documents/risk%20management%20process.pdf. January 2010.
U.S. Army. FM 3-11 Multi-Service Doctrine for Chemical, Biological, Radiological, and
Nuclear OperatioNS. Washington, DC: U.S. Army, 2011.
U.S. Army. Emergency War Surgery. Washington, DC: U.S. Governement, 2016. <http://
www.cs.amedd.army.mil/borden/FileDownloadpublic.aspx?docid=68aca9a0-9cd7
-4d8f-a17f-a4c01264daef>.
U.S. Commission on National Security/21st Century. Road Map for National Security.
Washington: U.S. Air Force, 2001.
U.S. Department of Defense. Military Support to Civil Authorities (MSCA) Department of
Defense Directive 3025.01. J. Washington, DC: U.S. Department of Defense, 1993.
U.S. Department of Defense. Strategy for Homeland Defense and Civil Support. Washington,
DC: U.S. Department of Defense, 2005.
U.S. Department of Defense. Defense Support of Civil Authorities Policy of the Twenty-First
Century. Washington, DC: U.S. Department of Defense, 2006.
U.S. Department of Defense. Assistant Secretary of Defense for Homeland Defense and
Americas’ Security Affairs (ASD(HD&ASA)). Department of Defense Directive
5111.13. Washington, DC: U.S. Department of Defense, 2009.
U.S. Department of Energy. Vulnerability Assessment Methodology, Electric Power
Infrastructure. Washington, DC: U.S. Department of Energy, 2002.
U.S. Department of Health and Human Services. Disaster Mortuary Operational Response
Teams (DMORTs). Washington, DC: U.S. Department of Health and Human Services,
2015.
U.S. Department of Homeland Security. National Response Plan. Washington, DC: U.S.
Department of Homeland Security, 2004.
U.S. Department of Transportation. Emergency Response Guide 2016. Washington, DC: U.S.
Department of Transportation, 2016.
U.S. Government Publishing Office. 22 U.S.C. 2656f - Annual Country Reports on Terrorism.
Retrieved from U.S. Government Publishing Office: https://www.gpo.gov/fdsys/granule
/USCODE-2010-title22/USCODE-2010-title22-chap38-sec2656f. January 15, 2017.
U.S. Government. The Classified National Security Information Protection Act. Washington,
DC: GPO, 2003.
Walzer, Michael. A discussion with Michael Malzer. Terrorisme.net. 2006.
Wisner, Ben. At Risk: Natural Hazards, People’s Vulnerability and Disasters (2nd ed.). New
York: Routledge, 2003.
Wormuth, Christine. The Future of the National Guard and Reserves: The Beyond
Goldwater-Nichols Phase III. Washington, DC: Center for Strategic and International
Studies, 2006.
Wright, Joe, and Jim Harmening. Computer and Information Security Handbook. Burlington:
Morgan Kaufmann Publications, 2009.
Zetter, Kim. An Unprecedented Look at Stuxnet, the World’s First Digital Weapon. New
York: Wired, 2014.
Index
A Communication
crisis, 100
Accountability, see Professional accountability escalating crisis, 37
Acronyms and abbreviations, 327–333 risk perception and, 34–38
Agricultural vulnerability, 47 Community, 62
Anthropogenic intentional hazards, 44 emergency response teams (CERTs), 28
Anthropogenic nonintentional processes, 43 stakeholders, 28–29
As low as reasonably achievable (ALARA) Composite risk management (CRM) process,
objective, 60 127–130
Atmospheric-sourced processes, 42 exposure, 129
Atomic-bomb blueprint, 214 levels of risk management, 127
principles, 128
B probability, 129
risk assessment matrix, 128–129
Ballistic threats, 185–186 risk components, 129–130
Biological hazards, 131, 132 risk priority list, 129
Biological processes, 43 severity, 129
BP case study, see Gulf of Mexico oil spill and steps, 127
BP case study Comprehensive Emergency Management Plan
Business (CEMP), 26
continuity planning, 101–102 Computer security, 84–85
interruption, 28 Computers and IT systems, threats to, 142–144
recovery, 63, 99 Concept of operations (CONOPS), 61, 256, 291
Confrontation crisis, 97
C Consequence management, 105–113
all-hazard approach, 107
CAR program, see State Capability Assessment benefits of consequence management
for Readiness (CAR) program systems, 111–112
CBRNE (chemical, biological, radiological, coordinating response, 112–113
nuclear, and high-yield explosives), 44 software, 108–110
CEMP, see Comprehensive Emergency Contingency
Management Plan fund, 32
Central Intelligence Agency (CIA) triad, 144 planning, 101
Certification, 73–74 Controller, 68
Certified Business Continuity Professional Countersurveillance, 93–94
(CBCP), 12, 25 Crime Prevention through Environmental Design
Certified Emergency Manager (CEM), 12, 25, (CPTED), 183
74, 243 Crisis management, 95–104
CERTs, see Community emergency response apologies, role of, 102
teams (CERTs) business continuity planning, 101–102
Channelization, 48 business recovery, 99
Chemical hazards, 131, 133 confrontation crisis, 97
CIKR, see Critical infrastructure and key containment and damage control, 99
resources (CIKR) contingency planning, 101
Citizen emergency response, see Disaster crisis communication, 100
myths, disaster demands, and citizen crisis leadership, 98–99, 103
emergency response crisis of malevolence, 97
Civil disobedience, 44 crisis management model, 100
Coercive power, reward and, 29 crisis management planning, 101
Cognitive vulnerability, 140
349
350 Index
R S
Rapid assessment, 64 Sabotage, 223
Recovery, 19 School Emergency Response Plan (ERP)
Referent power, 29 Template, 247–280
Religious terrorism, 164 administration, finance, and logistics,
Response, 19 272–273
Reward and coercive power, 29 agency/department-focused ERP format basic
Right-to-know (RTK) provisions, 50 plan, 248
Risk, 89–91; see also Hazards (risk) authorities and references, 275–276
acceptance, 81 Concept of Operations, 256–260
assessment and analysis, 91 definitions, 276–279
avoidance, 80–81 direction, control, and coordination,
communication, 68 264–271
definitions, 90 Emergency Response Plan organization, 247
options, 80–81 Emergency Response Plan Template, 247,
quantitative analysis, 91 279–280
reduction, 81 information collection, analysis, and
spreading, 81 dissemination, 272
transfer, 81 introduction material, 249–251
Risk management, 115–125; see also National Incident Management System,
Composite risk management 258–259
(CRM) process organization and assignment of
assessment, 118–119 responsibilities, 260–264
composite risk index, 119–120 plan development and maintenance, 273–275
establishing the context, 117 purpose, scope, situation, and assumptions,
hazard analysis, 123 252–256
hazard prevention, 121 table of contents, 248–249
hazards and risk, 124 Secondary impacts, 19
358 Index