Emergency Response to Terrorism TC: Emergency Medical Services Unit 3:Security

Preview:

Citation preview

Emergency Response to TerrorismTC: Emergency Medical Services

Unit 3: Security

3-2

Terminal Objective

Given a simulated terrorist event, the student will be able to ID security concerns regarding responses and on-site operation

3-3

Enabling Objectives

ID difference between known and unknown incidents

ID aspects of vulnerability ID primary security actions to take when a

terrorist event occurs ID how topography will impact security ID different strategies and tactics to be

utilized for self-preservation

3-4

Pre-Response Conditions

Different response ifKnown terrorist incidentUnknown terrorist incident

IndicatorsUpdate from dispatch

3-5

Response Criteria

Primary actions involving responders on the scene or en route to the incident

Life protection/preservation Controlling chaos Requesting assistance

3-6

Vulnerability Assessment

Purpose - determine shortfalls and weaknesses when responding to terrorist acts

Assistance of law enforcement necessary for security-related areas

3-7

Vulnerability Assessment:Areas to Consider

Incident site operations Pre-planning response routes (primary and secondary) Command and control sites IED awareness training Secondary explosive devices/booby trap awareness training Multiple-incident site operations considerations

3-8

Vulnerability Assessment:Areas to Consider (cont.)

Pre-planned and proposed staging areas Communications plans (primary and secondary) Medical operations Medical receiving facilities Casualty collection points Mortuary facilities (fixed and temporary) Evacuation sites

3-9

Vulnerability Assessment:Areas to Consider (cont.)

Shelter-in-place considerations Personnel and equipment resources Re-supply resources Security resources Mass casualty response resources (transportation, medical, command and control) Responder knowledge of B-NICE threat outward warning signs

3-10

Vulnerability Assessment:Areas to Consider (cont.)

Evidence preservation training Responder self-protection measures training Rescue operations

3-11

Protective Actions

Hazard A known or perceived danger Chem agent, HazMat, hazardous conditions

Risk Acceptable or unacceptable Exposure to known or perceived danger Gamble whether or not danger will prevail

3-12

Vulnerability

Disadvantage

Exposed position

Threat/Hazard

3-13

Security

Response security: actions to be taken en route

Establishing security-related procedures: Preplan

3-14

Response Security

Response routes & corridors ID primary & alternate response routes ID choke points Designate rallying points

3-15

Preplanning for Survivability

Incident site emergency egress plan Backup team Ruse tactics checklist Methods of alternate or secure

communications Detailed checklist to query involved personnel Gather all info possible on what happened

3-16

Topography

Controls access Bottlenecks Limited access Access & exit

corridors Natural & manmade

characteristics

3-17

Impacts

Are you being drawn into a trap? Are you being forced to advance uphill? Are terrain features forcing you to deviate

from your plan? Are things going according to someone

else’s plan?

3-18

Zones/Perimeter Communications

Concise & clear naming Crosses all boundaries of the country &

agencies Labeling by hazard or protection need

3-19

Perimeter Criteria

Direct zone names & placement

Security Hazardous materials Hazardous conditions Health Biological

3-20

Strategies & Tactics for Self-Protection

Recognition & survival - develop skills to minimize losses

Initial reconnaissance Route Incident site Vulnerability assessment

Overview

3-21

Initial Recon: Route

Determine vulnerable areas Channeling Choke points Ambush

3-22

Initial Recon: Site

Possibility of IEDs Hazards & associated devices Distraction techniques Hoax device tactics Maximize responder survivability

3-23

Initial Recon: Site (cont.)

Ambush tactics Recognition skills: types of devices Rapid evacuation planning issues When device is discovered, what to do?

3-24

Vulnerability Assessment

Where & what are the dangers? Discipline Time to assess ID things that place you at a disadvantage ID exposures & reduce

3-25

Protective Measures

Rig placement Safety of crew Discipline Minimize losses

Risk vs. Benefit Withdrawal policy No acceptable

losses

3-26

Tactical Options

Protection

Reconnaissance

Overview

3-27

Protection Options

Enhance overall responder survivability & supportability

Physically hazardous conditions Proper PPE for the hazard Decon Monitoring Physical shelter Vulnerability assessment Security considerations

3-28

Reconnaissance Options

Recon Team activities Topographical maps Census maps Building plans

3-29

Activity 3.1

Post Office Scenario (Part 1)

3-30

Activity 3.1 (cont.)

3-31

Activity 3.1 (cont.)

3-32

Activity 3.1 (cont.)

3-33

Activity 3.1 (cont.)

3-34

Post Office: Phase 1

1000 hours MONDAY Your agency is dispatched to the local

post office on an EMS call for a female with shortness of breath. The local police department also responds with one police car. While you are responding, your dispatcher notifies you that there are additional calls. Some of the callers are reporting a male victim.

3-35

Post Office: Phase 2

1005 hours MONDAY Upon arrival you see approx. 15 people outside

the main door to the post office coughing, tearing, & calling for help. Several are on their knees. As you put the vehicle in park, 5 people start running toward you calling for help.

The people report that there was a white cloud in the lobby & their eyes & skin started burning.

3-36

Primary actions: life protection, controlling chaos & requesting assistance

ID the hazards, build acceptable risks, analyze vulnerability

Establish procedures before you need them

Summary

Recommended