Skip to:Content
|
Bottom
Cover image for Physical security and environmental protection
Title:
Physical security and environmental protection
Personal Author:
Physical Description:
xi, 331 pages:illustrations; 24 cm.
ISBN:
9781482211948
Abstract:
"Preface A disaster is a natural or man-made hazard resulting in an event of substantial magnitude causing significant physical damage or destruction, loss of life, or drastic change to the environment. It can be defined as any tragic event stemming from events such as earthquakes, floods, catastrophic accidents, fires, or explosions. It is a phenomenon that can cause damage to life and property and destroy the economic, social, and cultural life of people. When disaster strikes a vulnerable population, the incident evokes a combination of horror and empathy among a country's population. Similarly, unless a response is carefully planned and successfully carried out, a government can appear impotent or nonresponsive to the dangers facing its citizens. Often disasters result from mismanagement of the risks involved. The risks involved are a product of both hazards and vulnerability. Hazards that strike areas with low vulnerability never become disasters. Similarly, developing countries suffer the most when it comes to disasters, since they lack the tools and coping capacity to effectively deal with a disaster. However, industrialized nations are more resilient and capable in dealing with disasters. In this book I have attempted to assemble a guide through the disaster management process including prevention, mitigation, preparedness, response, and recovery for individuals interested in this field of study. The handbook guides the reader through the various phases of disaster management. Chapter 1 is an introduction to the emergency management process, which includes sections on hazard analysis, emergency planning, effective communication, leadership, and management of volunteers. Chapter 2 discusses threats assessment including an all-hazard approach to threat assessments,"-- Provided by publisher

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010341056 HV551.2 P37 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

Manage a Hazard or Threat Effectively and Prevent It from Becoming a Disaster

When disaster strikes, it can present challenges to those caught off guard, leaving them to cope with the fallout. Adopting a risk management approach to addressing threats, vulnerability, and risk assessments is critical to those on the frontline. Developed with first responders at the municipal, state, provincial, and federal level in mind, Physical Security and Environmental Protection guides readers through the various phases of disaster management, including prevention, mitigation, preparedness, response, and recovery. It contains the steps and principles essential to effectively managing a hazard or threat, preventing it from becoming a disaster.

From the Initial Threat Assessment to Response and Recovery Operations

Considering both natural and manmade disasters, this text includes sections on hazard analysis, emergency planning, effective communication, and leadership. It covers threat assessment, examines critical infrastructure protection, and addresses violent behavior. The text also outlines protection strategies; discussing strategy management, identifying suspicious behavior, and detailing how to avoid a potential attack. The text includes an overview on developing force protection plans, security plans, and business continuity plans.

The book also addresses response and recovery operations, explores post-incident stress management, and poses the following questions:

What hazards exist in or near the community? How frequently do these hazards occur? How much damage can they cause? Which hazards pose the greatest threat?

This text includes the tools and information necessary to help readers develop business continuity, force protection, and emergency preparedness plans for their own group or organization.


Author Notes

Dr. John Perdikaris is a registered professional engineer in the province of Ontario, Canada. He has 15 years of varied engineering and emergency management experience on a variety of projects within the province of Ontario, including acting as project manager on various engineering and emergency preparedness projects. He holds a master's degree in engineering from the University of Guelph, Ontario, and a PhD from the same university. His fields of expertise include force protection, critical infrastructure protection, emergency management, water resources management, forecasting and warning systems, and modeling and simulation.


Table of Contents

Prefacep. ix
Authorp. xi
Chapter 1 Emergency Managementp. 1
1.1 Introduction to Disasters and Emergency Managementp. 1
1.2 Types of Disastersp. 2
1.3 Emergency Planningp. 4
1.4 All-Hazards Approach to Disaster Managementp. 12
1.5 Decision Making and Problem Solvingp. 15
1.6 Leadership and Influencep. 18
1.7 Effective Communication Skillsp. 22
1.8 Developing and Managing Volunteersp. 24
Chapter 2 Threat Ensemble, Vulnerability, and Risk Assessmentsp. 29
2.1 Introductionp. 29
2.2 Threat Assessmentp. 31
2.3 Vulnerability Assessmentp. 39
2.4 Risk Assessmentp. 45
Chapter 3 Critical Infrastructure Protectionp. 47
3.1 Introductionp. 47
3.2 Building Securityp. 48
3.2.1 Unauthorized Entry (Forced and Covert)p. 67
3.2.2 Insider Threatsp. 68
3.2.3 Explosive Threats: Stationary and Moving Vehicle-Delivered Bombs, Mail Bombs, and Package Bombsp. 68
3.2.4 Ballistic Threatsp. 69
3.2.5 WMD: CBRp. 70
3.2.6 Cyber and Information Security Threatsp. 71
3.2.7 Development and Training on Occupant Emergency Plansp. 71
3.3 Water Supply Systems Securityp. 71
3.4 Security for Energy Facilitiesp. 87
3.5 Food and Agricultural Securityp. 93
3.6 Aviation Securityp. 95
3.7 Maritime Security and Asset Protectionp. 99
3.8 Land Transportation Security Systemsp. 103
3.9 Cybersecurityp. 107
Chapter 4 Targeted Violence and Violent Behaviorp. 113
4.1 Introductionp. 113
4.2 Methods and the Mind-Set of a Terroristp. 114
4.3 Terrorismp. 116
4.4 Organized Crimep. 120
4.5 Maritime Piracyp. 123
4.6 Incidents and Indicatorsp. 126
4.7 Suspicious Activityp. 129
4.8 Avoiding an Attackp. 133
Chapter 5 Protection Strategiesp. 137
5.1 Physical Securityp. 137
5.2 Improvised Explosive Devices Awarenessp. 143
5.3 Surveillance and Countersurveillancep. 145
5.4 Conducting a Site Security Surveyp. 154
5.5 Geospatial Intelligencep. 157
5.6 Technical Surveillance and Countermeasuresp. 159
5.7 Protection against Explosives and Blast Effectsp. 162
5.7.1 Stationary Vehicle along Secured Perimeter Linep. 165
5.7.2 Stationary Vehicle in a Parking Garage or Loading Dockp. 165
5.7.3 Moving Vehicle Attackp. 165
5.7.4 Hand-Carried Weapon Placed against the Exterior Envelopep. 166
5.8 Responding to Cyberattacksp. 175
5.9 Executive and Close Personal Protectionp. 178
5.10 Travel Securityp. 194
Chapter 6 Management Strategiesp. 201
6.1 Crisis and Incident Managementp. 201
6.2 Bomb Threat Managementp. 206
6.3 Managing a Technical Surveillance and Countermeasures Detailp. 210
6.4 Managing a Close Protection Detailp. 217
6.5 Managing Disasters in the Data Centerp. 219
6.5.1 Section 1-Document Introductionp. 221
6.5.2 Section 2-Crisis Scenarios/Situationsp. 221
6.5.3 Section 3-Crisis Considerationsp. 221
6.5.4 Section 4-Crisis Management Teamp. 222
6.5.5 Section 5-Crisis Management Facilityp. 222
6.5.6 Section 6-Notification Proceduresp. 222
6.5.7 Section 7-Action Proceduresp. 222
6.5.8 Section 8-Postcrisis Analysisp. 222
6.5.9 Section 9-Plan Exercisingp. 223
6.5.10 Section 10-Appendixp. 223
6.6 Hostage Survival and Crisis Negotiationsp. 225
6.7 Managing Violent Behavior in the Workplacep. 241
6.7.1 Type I Attacker-Criminal Intentp. 242
6.7.2 Type II Attacker-Customer and/or Clientp. 242
6.7.3 Type III Attacker-Worker-on-Workerp. 243
6.7.4 Type IV Attacker-Personal Relationshipp. 243
6.8 Event and Crowd Managementp. 247
Chapter 7 Contingency Plansp. 253
7.1 Developing a Force Protection Planp. 253
7.1.1 Estimate the Threatp. 253
7.1.2 Assess Vulnerabilitiesp. 254
7.1.3 Develop Protective Measuresp. 254
7.1.4 Conduct Routine Security Operationsp. 254
7.1.5 Conduct Contingency Operationsp. 254
7.2 Developing a Security Planp. 255
7.2.1 Approvalsp. 255
7.2.2 Executive Summaryp. 255
7.2.3 Communications and Consultationsp. 255
7.2.4 Contextp. 256
7.2.5 Security Risk Assessmentp. 257
7.2.6 Security Risk Treatment Processp. 257
7.2.7 Implementationp. 257
7.3 Developing a Business Continuity Planp. 258
7.3.1 Analysis Phasep. 258
7.3.2 Solution Design Phasep. 259
7.3.3 Implementation Phasep. 260
7.3.4 Testing Phasep. 260
7.3.5 Maintenance Phasep. 261
Chapter 8 Response and Recovery Operationsp. 263
8.1 Responding to Natural and Human-Induced Disastersp. 263
8.1.1 Natural Disastersp. 263
8.1.2 Human-Induced Disastersp. 265
8.2 Responding to Chemical, Biological, Radiological, Nuclear, Explosive, and Incendiary Eventsp. 265
8.2.1 Biological Agentsp. 266
8.2.1.1 Wet or Dry Agent from a Point Sourcep. 266
8.2.1.2 Threat of Dry Agent Placed in HVAC or Package with No Physical Evidencep. 266
8.2.13 Confirmed Agent Placed in HVAC System (Visible Fogger, Sprayer, or Aerosol Device)p. 267
8.2.2 Nuclear or Radiological Agentsp. 267
8.2.3 Incendiary Devicesp. 268
8.2.4 Chemical Agentsp. 268
8.2.5 Explosivesp. 270
8.2.5.1 Unexploded Device and Preblast Operationsp. 270
8.2.5.2 Explosive Device Preblastp. 270
8.2.5.3 Explosive Device Postblastp. 271
8.2.5.4 Agency-Related Actions, Fire Departmentp. 272
8.2.5.5 Emergency Medical Servicesp. 273
8.2.5.6 Law Enforcementp. 274
8.2.5.7 Ha/Mat Groupp. 275
8.3 Responding to a Terrorist Eventp. 276
8.4 Disaster Recovery Operationsp. 281
8.5 Special Response Teamsp. 283
8.6 Stress Management after a Disasterp. 285
Appendix A Select Emergency Management Organizationsp. 289
Appendix B Top 10 Global Disasters Since 1900p. 297
Appendix C Select Global Special Operations Teamsp. 299
Appendix D Select Global Terrorist Organizationsp. 303
Bibliographyp. 307
Indexp. 323
Go to:Top of Page