ALL HAZARD APPROACH Raising the Overall Level of Preparedness

Preview:

DESCRIPTION

ALL HAZARD APPROACH Raising the Overall Level of Preparedness. WMD. Level of Preparedness. Hurricane. Fire. Mass Casualty. Infrastructure. Frequency of Type of Incident. Homeland Security Presidential Directive-5 Management of Domestic Incidents. - PowerPoint PPT Presentation

Citation preview

UCI Company Proprietary 1

ALL HAZARD APPROACHRaising the Overall Level of Preparedness

Frequency of Type of Incident

Lev

el o

f P

repa

redn

ess

Hurricane

Mass Casualty

WMD

Fire

Infrastructure

UCI Company Proprietary 2

Homeland Security Presidential Directive-5Management of Domestic Incidents

“To prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other emergencies, the United States Government shall establish a single, comprehensive approach to domestic incident management. The objective of the United States Government is to ensure that all levels of government across the Nation have the capability to work efficiently and effectively together, using a national approach to domestic incident management. In these efforts, with regard to domestic incidents, the United States Government treats crisis management and consequence management as a single, integrated function, rather than as two separate functions. “

UCI Company Proprietary 3

Homeland Security Presidential Directive-5Management of Domestic Incidents

“The Secretary shall develop, submit for review to the Homeland Security Council, and administer a National Incident Management System (NIMS). This system will provide a consistent nationwide approach for Federal, State, and local governments to work effectively and efficiently together to prepare for, respond to, and recover from domestic incidents, regardless of cause, size, or complexity. To provide for interoperability and compatibility among Federal, State, and local capabilities, the NIMS will include a core set of concepts, principles, terminology, and technologies covering the incident command system; multi-agency coordination systems; unified command; training; identification and management of resources (including systems for classifying types of resources); qualifications and certification; and the collection, tracking, and reporting of incident information and incident resources.”

UCI Company Proprietary 4

What is IMS?

• Boilerplate - rules of the game

• A toolbox - “Use what you need!”

• Common terms

• Bottom up decision making

• Effective resource allocation

UCI Company Proprietary 5

Who Does IMS Apply To?FIRST RESPONDERS

• Typically considered Fire, Police, Paramedic, Emergency Medicine, Public Health

• New concepts include convergent response

• Generally consists of first organized response

UCI Company Proprietary 6

Actions of civilian responders

• Stumble into the mayhem• Hopefully recognize the problem• Apply limited resources• Scream for help• Locals act as “speed bumps.” (J. Denney, LAFD)

UCI Company Proprietary 7

Convergent Players

• Utility companies

• Postal and express delivery services

• Meter readers and inspectors

• Transit – Buses and taxis

• Public works crews

• Private security and volunteer watch groups

• Real estate agents

UCI Company Proprietary 8

Incident Management Systems

• Urban Fire IMS• Wildland Fire IMS• Emer. Medical IMS• Law Enforcement IMS• Public Works IMS• Hospital Emer. IMS• National Interagency

Incident Mgmt. Sys.

UCI Company Proprietary 9

Basic principles

• Function driven

• Span of control< 5

• Inter-agency model

• Effective resource allocation

• Information sharing & group decision making

UCI Company Proprietary 10

The CNN factor

The big dog will eat; you can feed him, or he’ll go through your garbage!

“Embedded Reporter”

UCI Company Proprietary 11

IMS/DoD Integration• Unified command – both parties share the

sandbox

• DoD integration at the section level (operations, logistics, planning)

• DoD units team with strike teams, task forces, or units (ex: CBIRF with Haz Mat)

• Any combinations of the above

UCI Company Proprietary 12

Presidential Strategy

• HLS – build and oversee national system for incident management

• State/local adoption requirement for Federal funding

• Essential Requirements:– Standard incident management system– Interagency planning– Wireless communication interoperability– Local threat assessment and notification

UCI Company Proprietary 13

The Big Four Revisited

1.) Joint operations – IMS/C3I integration; national ICS all-hazard overhead teams

2.) Common Operational Picture – Coordination with Northern Command; Access 250

3.) Planning and sustainability – DoD planning model integrated into IMS; national cache system with national contracting model

4.) Training – Required integrated/coordinated with common exercise objectives

UCI Company Proprietary 14

Information Operations (IO)• Most agencies are

clueless!

• What does the community have to know?

• Our infrastructure is a “house of cards.”

• Websites are “wide open”

• We need standards, guidance, and training.

UCI Company Proprietary 15

WTC Communications

• Very complex incident

• Command destroyed

• Mass officer fatalities

• Confused situational awareness

• Com incompatibility in every U.S. region

UCI Company Proprietary 16

D.C. Police Experience on Sept. 11

• OPM closed federal offices but never notified Metro (D.C.) Police

• Metro Police got alerts from CNN• Local officials were out of position and could

not move due to traffic• All comm was overloaded or failed• The 50 year old EBS system was never used

UCI Company Proprietary 17

UCI Company Proprietary 18

UCI Company Proprietary 19

The New Threat Warning System

• National level threat advisory system

• Warnings are not threat and location specific

UCI Company Proprietary 20

Threat Warning System

• Purpose– To standardize knowledge and response to

various threat levels

– To allow various communities and organizations to have a “common operational picture” of the situation

• Replaces ad-hoc alert levels and status

UCI Company Proprietary 21

Threat Warning System

• Low Condition (green)– Low Risk of Attack

– Actions include

• General training and review of plans

• Maintenance of response capability

• Practice Institutional Response Procedures

UCI Company Proprietary 22

Threat Warning System

• Guarded Condition (Blue)– Possibility of generalized terrorist attack

• No specific threat• No specific target

– Actions include• Check communications with emergency

resources• Review and update emergency procedures• Provide public with information to assist in

their preparedness

UCI Company Proprietary 23

Threat Warning System• Elevated Condition (Yellow)

– Significant risk of terrorist attack• No specific targets but possible specified threat

– Actions include• Increase surveillance of critical locations

• Coordinate emergency plans as appropriate with nearby jurisdictions

• Assess whether specific threat requires modification of plans

• Implement, as appropriate, contingency and emergency operations plans

UCI Company Proprietary 24

Threat Warning System• High Condition (Orange)

– High risk of terrorist attacks• Specific Threats• Specific Targets

– Actions include• Coordinate necessary security efforts at all levels of

government• Take additional precautions at high vulnerability, high

risk venues• Prepare to execute contingency emergency procedures• Restrict access, as needed, to threatened facilities

UCI Company Proprietary 25

Threat Warning System• Severe Condition (Red)

– Severe Risk of Terrorist Attack• Credible, specific evidence• High reliability of data• Corroboration of information

– Actions include• Increasing staff and personnel to emergency levels• Assigning and deploying emergency response personnel

and deploying teams and equipment• Monitoring, redirecting or constraining transportation• Closing public and government facilities

UCI Company Proprietary 26

After The Anthrax Scares

• The FBI said, “Quit calling us.”

• The fire guys said, “Quit calling us.”

• The Police picked up the slack.

• No training

• No protocols

• No equipment

UCI Company Proprietary 27

COMMUNICATIONTHREAT TYPES

• HAZMAT

• Blast/Burn

• Mass Casualty

• Infrastructure

Almost all incidents are combinations of two or more of the above

UCI Company Proprietary 28

COMMUNICATIONPRIORITIES

• LIFE

• PROPERTY

• ATTRIBUTION

UCI Company Proprietary 29

COMMUNICATIONOTHER ISSUES

• Classification and security

• Incompatible radios and commo gear

• Differences in methodology and CONOPS

• Who’s in charge and does what?

UCI Company Proprietary 30

Anthrax LessonsDecision Making without Data

• Need to make decisions rapidly in the absence of data

• Access to subject matter experts was limited• No “textbook” experience to guide response • Understanding of “risk” evolved as outbreak

unfolded• Need coherent, rapid process for addressing

scientific issues in midst of crisis

UCI Company Proprietary 31

Northern Command

• New command since September 11

• Responsible for the CONUS

• Assets loaned from other DoD commands

• Integrates with local responders

UCI Company Proprietary 32

Integration – Coordinating with Other Agencies

• Multiple emergency operations centers (EOC)

• When do you set up a local EOC?

• Beware of multiple command posts!

• Mobile communications units are not always compatible

UCI Company Proprietary 33

National Caches

• Regional

• Centralized ordering and Control System

• Incorporates push and pull logistics strategy

• Applicable for counter terrorism and other response caches

UCI Company Proprietary 34

Pharmaceutical Supplies

• Presently based on JIT (just-in-time) inventory practices

• Most hospitals and EMS services have only a two day supply

• DHHS/DHS presently working on national pharmaceutical cache system

UCI Company Proprietary 35

Quote of the Briefing

“Any sufficiently advanced technology is indistinguishable from magic.” Arthur C. Clark

UCI Company Proprietary 36

RESPONSESTECHNOLOGY

• NO R&D dollars in civilian first response community• Must leverage existing resources• Difference between system and technology• Recognize difference in missions and requirements

– Electronic Warfare– Reliability

• Needs MUST drive technology, not other way around

UCI Company Proprietary 37

HLS C2 ACTD VisionHLS C2 ACTD Vision

To define, refine and transition technologies and concepts of operations that significantly increase DoD Homeland Security responsiveness in consequence management, crisis response, deterrence and intelligence coordination.

UCI Company Proprietary 38

Recommended FocusCrisis response… Request for assistance – Strategic,

Operational, and TacticalConsequence management… Request for support -Strategic,

Operational, and TacticalTraining… Embedded self- training simulation packageCommon Relevant Operational Picture development

•Land, Maritime, Air, MACA domains•Web-based•Geo-spatially referenced•Multi-level security•Automated Response Data Processing

Assured redundant conductivity, voice, data, collaboration•Voice to text•Text to voice

UCI Company Proprietary 39

Problem Statement

Communications interrupted DoD insight was very limited Limited Intelligence sharing Slow Command, Control, and Coordination

between DoD and Civil authorities

UCI Company Proprietary 40

Lessons Learned• Interoperability

– Continued work is needed to provide data and application integration for time-sensitive situational awareness, command, control, and coordination

• Situational Awareness– Better methods to extract and disseminate sensor data for

visualization and alerting– Improve and automate the responder’s ability to recognize and

navigate available IT services• Assured Connectivity

– Quicker, easier configuration of communications equipment– Rapid deployment of wideband communications

• Information Assurance and Security– Improve protection of critical command, control and

coordination links between all civil and federal respondersFrom April 2002, Crisis Response Demonstration

UCI Company Proprietary 41

HLS TECHNOLOGY•Communications

– Assurance– Reliable– Bandwidth enhancement– QoS– Interoperability

•Network tools– Privacy– Security

•Visualization tools•Collaboration tools•Planning and management applications•Modeling tools•Reporting tools

UCI Company Proprietary 42

Summary• Threats are NOT magic!• Neither is the technology to combat them!• The user is the final say and expert, not the marketer or

technology developer• No technology is a solution unto itself; they all require

doctrine: The two together must be assessed and are a SYSTEM!

• Consider the mission as a system, not in isolation• Use minimum technology necessary to get job done- we

are not here to play with toys!• Technology must be driven by needs, never drive them

UCI Company Proprietary 43

MOST IMPORTANT!

• NO TECHNOLOGY IS A PANACEA!– NOTHING replaces well trained and capable

personnel– Every technology must have a doctrine for

use along with it, otherwise it is useless, and can cost lives

– Doctrine/need must drive technology, not be driven by it

UCI Company Proprietary 44

NOTHING REPLACES WELL TRAINED, COMPETENT AND

MOTIVATED PROFESSIONALS!

NOTHING!

PEOPLE ARE THE MOST IMPORTANT ASSET

Recommended