Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010341056 | HV551.2 P37 2014 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Manage a Hazard or Threat Effectively and Prevent It from Becoming a Disaster
When disaster strikes, it can present challenges to those caught off guard, leaving them to cope with the fallout. Adopting a risk management approach to addressing threats, vulnerability, and risk assessments is critical to those on the frontline. Developed with first responders at the municipal, state, provincial, and federal level in mind, Physical Security and Environmental Protection guides readers through the various phases of disaster management, including prevention, mitigation, preparedness, response, and recovery. It contains the steps and principles essential to effectively managing a hazard or threat, preventing it from becoming a disaster.
From the Initial Threat Assessment to Response and Recovery Operations
Considering both natural and manmade disasters, this text includes sections on hazard analysis, emergency planning, effective communication, and leadership. It covers threat assessment, examines critical infrastructure protection, and addresses violent behavior. The text also outlines protection strategies; discussing strategy management, identifying suspicious behavior, and detailing how to avoid a potential attack. The text includes an overview on developing force protection plans, security plans, and business continuity plans.
The book also addresses response and recovery operations, explores post-incident stress management, and poses the following questions:
What hazards exist in or near the community? How frequently do these hazards occur? How much damage can they cause? Which hazards pose the greatest threat?This text includes the tools and information necessary to help readers develop business continuity, force protection, and emergency preparedness plans for their own group or organization.
Author Notes
Dr. John Perdikaris is a registered professional engineer in the province of Ontario, Canada. He has 15 years of varied engineering and emergency management experience on a variety of projects within the province of Ontario, including acting as project manager on various engineering and emergency preparedness projects. He holds a master's degree in engineering from the University of Guelph, Ontario, and a PhD from the same university. His fields of expertise include force protection, critical infrastructure protection, emergency management, water resources management, forecasting and warning systems, and modeling and simulation.
Table of Contents
Preface | p. ix |
Author | p. xi |
Chapter 1 Emergency Management | p. 1 |
1.1 Introduction to Disasters and Emergency Management | p. 1 |
1.2 Types of Disasters | p. 2 |
1.3 Emergency Planning | p. 4 |
1.4 All-Hazards Approach to Disaster Management | p. 12 |
1.5 Decision Making and Problem Solving | p. 15 |
1.6 Leadership and Influence | p. 18 |
1.7 Effective Communication Skills | p. 22 |
1.8 Developing and Managing Volunteers | p. 24 |
Chapter 2 Threat Ensemble, Vulnerability, and Risk Assessments | p. 29 |
2.1 Introduction | p. 29 |
2.2 Threat Assessment | p. 31 |
2.3 Vulnerability Assessment | p. 39 |
2.4 Risk Assessment | p. 45 |
Chapter 3 Critical Infrastructure Protection | p. 47 |
3.1 Introduction | p. 47 |
3.2 Building Security | p. 48 |
3.2.1 Unauthorized Entry (Forced and Covert) | p. 67 |
3.2.2 Insider Threats | p. 68 |
3.2.3 Explosive Threats: Stationary and Moving Vehicle-Delivered Bombs, Mail Bombs, and Package Bombs | p. 68 |
3.2.4 Ballistic Threats | p. 69 |
3.2.5 WMD: CBR | p. 70 |
3.2.6 Cyber and Information Security Threats | p. 71 |
3.2.7 Development and Training on Occupant Emergency Plans | p. 71 |
3.3 Water Supply Systems Security | p. 71 |
3.4 Security for Energy Facilities | p. 87 |
3.5 Food and Agricultural Security | p. 93 |
3.6 Aviation Security | p. 95 |
3.7 Maritime Security and Asset Protection | p. 99 |
3.8 Land Transportation Security Systems | p. 103 |
3.9 Cybersecurity | p. 107 |
Chapter 4 Targeted Violence and Violent Behavior | p. 113 |
4.1 Introduction | p. 113 |
4.2 Methods and the Mind-Set of a Terrorist | p. 114 |
4.3 Terrorism | p. 116 |
4.4 Organized Crime | p. 120 |
4.5 Maritime Piracy | p. 123 |
4.6 Incidents and Indicators | p. 126 |
4.7 Suspicious Activity | p. 129 |
4.8 Avoiding an Attack | p. 133 |
Chapter 5 Protection Strategies | p. 137 |
5.1 Physical Security | p. 137 |
5.2 Improvised Explosive Devices Awareness | p. 143 |
5.3 Surveillance and Countersurveillance | p. 145 |
5.4 Conducting a Site Security Survey | p. 154 |
5.5 Geospatial Intelligence | p. 157 |
5.6 Technical Surveillance and Countermeasures | p. 159 |
5.7 Protection against Explosives and Blast Effects | p. 162 |
5.7.1 Stationary Vehicle along Secured Perimeter Line | p. 165 |
5.7.2 Stationary Vehicle in a Parking Garage or Loading Dock | p. 165 |
5.7.3 Moving Vehicle Attack | p. 165 |
5.7.4 Hand-Carried Weapon Placed against the Exterior Envelope | p. 166 |
5.8 Responding to Cyberattacks | p. 175 |
5.9 Executive and Close Personal Protection | p. 178 |
5.10 Travel Security | p. 194 |
Chapter 6 Management Strategies | p. 201 |
6.1 Crisis and Incident Management | p. 201 |
6.2 Bomb Threat Management | p. 206 |
6.3 Managing a Technical Surveillance and Countermeasures Detail | p. 210 |
6.4 Managing a Close Protection Detail | p. 217 |
6.5 Managing Disasters in the Data Center | p. 219 |
6.5.1 Section 1-Document Introduction | p. 221 |
6.5.2 Section 2-Crisis Scenarios/Situations | p. 221 |
6.5.3 Section 3-Crisis Considerations | p. 221 |
6.5.4 Section 4-Crisis Management Team | p. 222 |
6.5.5 Section 5-Crisis Management Facility | p. 222 |
6.5.6 Section 6-Notification Procedures | p. 222 |
6.5.7 Section 7-Action Procedures | p. 222 |
6.5.8 Section 8-Postcrisis Analysis | p. 222 |
6.5.9 Section 9-Plan Exercising | p. 223 |
6.5.10 Section 10-Appendix | p. 223 |
6.6 Hostage Survival and Crisis Negotiations | p. 225 |
6.7 Managing Violent Behavior in the Workplace | p. 241 |
6.7.1 Type I Attacker-Criminal Intent | p. 242 |
6.7.2 Type II Attacker-Customer and/or Client | p. 242 |
6.7.3 Type III Attacker-Worker-on-Worker | p. 243 |
6.7.4 Type IV Attacker-Personal Relationship | p. 243 |
6.8 Event and Crowd Management | p. 247 |
Chapter 7 Contingency Plans | p. 253 |
7.1 Developing a Force Protection Plan | p. 253 |
7.1.1 Estimate the Threat | p. 253 |
7.1.2 Assess Vulnerabilities | p. 254 |
7.1.3 Develop Protective Measures | p. 254 |
7.1.4 Conduct Routine Security Operations | p. 254 |
7.1.5 Conduct Contingency Operations | p. 254 |
7.2 Developing a Security Plan | p. 255 |
7.2.1 Approvals | p. 255 |
7.2.2 Executive Summary | p. 255 |
7.2.3 Communications and Consultations | p. 255 |
7.2.4 Context | p. 256 |
7.2.5 Security Risk Assessment | p. 257 |
7.2.6 Security Risk Treatment Process | p. 257 |
7.2.7 Implementation | p. 257 |
7.3 Developing a Business Continuity Plan | p. 258 |
7.3.1 Analysis Phase | p. 258 |
7.3.2 Solution Design Phase | p. 259 |
7.3.3 Implementation Phase | p. 260 |
7.3.4 Testing Phase | p. 260 |
7.3.5 Maintenance Phase | p. 261 |
Chapter 8 Response and Recovery Operations | p. 263 |
8.1 Responding to Natural and Human-Induced Disasters | p. 263 |
8.1.1 Natural Disasters | p. 263 |
8.1.2 Human-Induced Disasters | p. 265 |
8.2 Responding to Chemical, Biological, Radiological, Nuclear, Explosive, and Incendiary Events | p. 265 |
8.2.1 Biological Agents | p. 266 |
8.2.1.1 Wet or Dry Agent from a Point Source | p. 266 |
8.2.1.2 Threat of Dry Agent Placed in HVAC or Package with No Physical Evidence | p. 266 |
8.2.13 Confirmed Agent Placed in HVAC System (Visible Fogger, Sprayer, or Aerosol Device) | p. 267 |
8.2.2 Nuclear or Radiological Agents | p. 267 |
8.2.3 Incendiary Devices | p. 268 |
8.2.4 Chemical Agents | p. 268 |
8.2.5 Explosives | p. 270 |
8.2.5.1 Unexploded Device and Preblast Operations | p. 270 |
8.2.5.2 Explosive Device Preblast | p. 270 |
8.2.5.3 Explosive Device Postblast | p. 271 |
8.2.5.4 Agency-Related Actions, Fire Department | p. 272 |
8.2.5.5 Emergency Medical Services | p. 273 |
8.2.5.6 Law Enforcement | p. 274 |
8.2.5.7 Ha/Mat Group | p. 275 |
8.3 Responding to a Terrorist Event | p. 276 |
8.4 Disaster Recovery Operations | p. 281 |
8.5 Special Response Teams | p. 283 |
8.6 Stress Management after a Disaster | p. 285 |
Appendix A Select Emergency Management Organizations | p. 289 |
Appendix B Top 10 Global Disasters Since 1900 | p. 297 |
Appendix C Select Global Special Operations Teams | p. 299 |
Appendix D Select Global Terrorist Organizations | p. 303 |
Bibliography | p. 307 |
Index | p. 323 |