ebook img

Physical Security and Environmental Protection PDF

338 Pages·2014·22.647 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Physical Security and Environmental Protection

CIVIL ENGINEERING P e r d i k Physical Security and a r i s Physical Security and Environmental Protection Environmental Protection Manage a Hazard or Threat Effectively and Prevent It P from Becoming a Disaster h y When disaster strikes, it can present challenges to those caught off guard, leaving them s to cope with the fallout. Adopting a risk management approach to addressing threats, i c vulnerability, and risk assessments is critical to those on the frontline. Developed with a first responders at the municipal, state, provincial, and federal level in mind, Physical l Security and Environmental Protection guides readers through the various S phases of disaster management, including prevention, mitigation, preparedness, e c response, and recovery. It contains the steps and principles essential to effectively u managing a hazard or threat, preventing it from becoming a disaster. r i t y From the Initial Threat Assessment to Response and Recovery Operations a n Considering both natural and manmade disasters, this text includes sections on hazard d analysis, emergency planning, effective communication, and leadership. It covers E threat assessment, examines critical infrastructure protection, and addresses violent n behavior. The text also outlines protection strategies; discussing strategy management, v identifying suspicious behavior, and detailing how to avoid a potential attack. The i r text includes an overview on developing force protection plans, security plans, and o business continuity plans. n m The book also addresses response and recovery operations, explores post-incident e stress management, and poses the following questions: n t a • What hazards exist in or near the community? l • How frequently do these hazards occur? P r • How much damage can they cause? o • Which hazards pose the greatest threat? t e John Perdikaris c This text includes the tools and information necessary to help readers develop business t i continuity, force protection, and emergency preparedness plans for their own group o or organization. n K21699 6000 Broken Sound Parkway, NW Suite 300, Boca Raton, FL 33487 711 Third Avenue New York, NY 10017 an informa business 2 Park Square, Milton Park www.crcpress.com Abingdon, Oxon OX14 4RN, UK www.crcpress.com Physical Security and Environmental Protection Physical Security and Environmental Protection John Perdikaris Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2014 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20140317 International Standard Book Number-13: 978-1-4822-1195-5 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents Preface.......................................................................................................................ix Author .......................................................................................................................xi Chapter 1 Emergency Management ......................................................................1 1.1 Introduction to Disasters and Emergency Management ............1 1.2 Types of Disasters ......................................................................2 1.3 Emergency Planning ..................................................................4 1.4 All-Hazards Approach to Disaster Management ....................12 1.5 Decision Making and Problem Solving ...................................15 1.6 Leadership and Influence ........................................................18 1.7 Effective Communication Skills .............................................22 1.8 Developing and Managing Volunteers ....................................24 Chapter 2 Threat Ensemble, Vulnerability, and Risk Assessments ....................29 2.1 Introduction .............................................................................29 2.2 Threat Assessment ...................................................................31 2.3 Vulnerability Assessment ........................................................39 2.4 Risk Assessment ......................................................................45 Chapter 3 Critical Infrastructure Protection .......................................................47 3.1 Introduction .............................................................................47 3.2 Building Security .....................................................................48 3.2.1 Unauthorized Entry (Forced and Covert) ...................67 3.2.2 Insider Threats ............................................................68 3.2.3 Explosive Threats: Stationary and Moving Vehicle-Delivered Bombs, Mail Bombs, and Package Bombs ....................................................68 3.2.4 Ballistic Threats .........................................................69 3.2.5 WMD: CBR ................................................................70 3.2.6 Cyber and Information Security Threats ...................71 3.2.7 Development and Training on Occupant Emergency Plans ........................................................71 3.3 Water Supply Systems Security ...............................................71 3.4 Security for Energy Facilities ..................................................87 3.5 Food and Agricultural Security ...............................................93 3.6 Aviation Security .....................................................................95 3.7 Maritime Security and Asset Protection .................................99 v vi Contents 3.8 Land Transportation Security Systems .................................103 3.9 Cybersecurity ........................................................................107 Chapter 4 Targeted Violence and Violent Behavior ..........................................113 4.1 Introduction ...........................................................................113 4.2 Methods and the Mind-Set of a Terrorist ..............................114 4.3 Terrorism ...............................................................................116 4.4 Organized Crime ...................................................................120 4.5 Maritime Piracy .....................................................................123 4.6 Incidents and Indicators.........................................................126 4.7 Suspicious Activity ................................................................129 4.8 Avoiding an Attack ................................................................133 Chapter 5 Protection Strategies .........................................................................137 5.1 Physical Security ...................................................................137 5.2 Improvised Explosive Devices Awareness ............................143 5.3 Surveillance and Countersurveillance ...................................145 5.4 Conducting a Site Security Survey ........................................154 5.5 Geospatial Intelligence ..........................................................157 5.6 Technical Surveillance and Countermeasures ......................159 5.7 Protection against Explosives and Blast Effects ....................162 5.7.1 Stationary Vehicle along Secured Perimeter Line ...165 5.7.2 Stationary Vehicle in a Parking Garage or Loading Dock ...........................................................165 5.7.3 Moving Vehicle Attack .............................................165 5.7.4 Hand-Carried Weapon Placed against the Exterior Envelope .....................................................166 5.8 Responding to Cyberattacks ..................................................175 5.9 Executive and Close Personal Protection ..............................178 5.10 Travel Security .......................................................................194 Chapter 6 Management Strategies ....................................................................201 6.1 Crisis and Incident Management ...........................................201 6.2 Bomb Threat Management ....................................................206 6.3 Managing a Technical Surveillance and Countermeasures Detail ........................................................210 6.4 Managing a Close Protection Detail .....................................217 6.5 Managing Disasters in the Data Center .................................219 6.5.1 Section 1—Document Introduction .........................221 6.5.2 Section 2—Crisis Scenarios/Situations ....................221 6.5.3 Section 3—Crisis Considerations ............................221 Contents vii 6.5.4 Section 4—Crisis Management Team .....................222 6.5.5 Section 5—Crisis Management Facility ..................222 6.5.6 Section 6—Notification Procedures .........................222 6.5.7 Section 7—Action Procedures .................................222 6.5.8 Section 8—Postcrisis Analysis ................................222 6.5.9 Section 9—Plan Exercising......................................223 6.5.10 Section 10—Appendix .............................................223 6.6 Hostage Survival and Crisis Negotiations .............................225 6.7 Managing Violent Behavior in the Workplace ......................241 6.7.1 Type I Attacker—Criminal Intent ............................242 6.7.2 Type II Attacker—Customer and/or Client ..............242 6.7.3 Type III Attacker—Worker-on-Worker ....................243 6.7.4 Type IV Attacker—Personal Relationship ...............243 6.8 Event and Crowd Management ..............................................247 Chapter 7 Contingency Plans ............................................................................253 7.1 Developing a Force Protection Plan ......................................253 7.1.1 Estimate the Threat ..................................................253 7.1.2 Assess Vulnerabilities ..............................................254 7.1.3 Develop Protective Measures ...................................254 7.1.4 Conduct Routine Security Operations ......................254 7.1.5 Conduct Contingency Operations ............................254 7.2 Developing a Security Plan ...................................................255 7.2.1 Approvals .................................................................255 7.2.2 Executive Summary .................................................255 7.2.3 Communications and Consultations .........................255 7.2.4 Context .....................................................................256 7.2.5 Security Risk Assessment ........................................257 7.2.6 Security Risk Treatment Process .............................257 7.2.7 Implementation .........................................................257 7.3 Developing a Business Continuity Plan.................................258 7.3.1 Analysis Phase ..........................................................258 7.3.2 Solution Design Phase ..............................................259 7.3.3 Implementation Phase ..............................................260 7.3.4 Testing Phase ............................................................260 7.3.5 Maintenance Phase ...................................................261 Chapter 8 Response and Recovery Operations .................................................263 8.1 Responding to Natural and Human-Induced Disasters .........263 8.1.1 Natural Disasters ......................................................263 8.1.2 Human-Induced Disasters ........................................265 viii Contents 8.2 Responding to Chemical, Biological, Radiological, Nuclear, Explosive, and Incendiary Events ...........................265 8.2.1 Biological Agents .....................................................266 8.2.1.1 Wet or Dry Agent from a Point Source ....266 8.2.1.2 Threat of Dry Agent Placed in HVAC or Package with No Physical Evidence .....266 8.2.1.3 Confirmed Agent Placed in HVAC System (Visible Fogger, Sprayer, or Aerosol Device) ........................................267 8.2.2 Nuclear or Radiological Agents ...............................267 8.2.3 Incendiary Devices ...................................................268 8.2.4 Chemical Agents ......................................................268 8.2.5 Explosives .................................................................270 8.2.5.1 Unexploded Device and Preblast Operations .................................................270 8.2.5.2 Explosive Device Preblast ........................270 8.2.5.3 Explosive Device Postblast .......................271 8.2.5.4 Agency-Related Actions, Fire Department ...............................................272 8.2.5.5 Emergency Medical Services ...................273 8.2.5.6 Law Enforcement ......................................274 8.2.5.7 HazMat Group ..........................................275 8.3 Responding to a Terrorist Event ............................................276 8.4 Disaster Recovery Operations ...............................................281 8.5 Special Response Teams .......................................................283 8.6 Stress Management after a Disaster ......................................285 Appendix A: Select Emergency Management Organizations ..........................289 Appendix B: Top 10 Global Disasters Since 1900 .............................................297 Appendix C: Select Global Special Operations Teams ....................................299 Appendix D: Select Global Terrorist Organizations ........................................303 Bibliography .........................................................................................................307

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.