• Save
Quarterly Security Meeting (Shelter in Place)
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Quarterly Security Meeting (Shelter in Place)

on

  • 262 views

Community Antiterrorism Training Institute (CAT Eyes) Quarterly Security Meeting, main topic - Shelter in Place. Presentation includes an update on TSA security grant funding program for buses, and ...

Community Antiterrorism Training Institute (CAT Eyes) Quarterly Security Meeting, main topic - Shelter in Place. Presentation includes an update on TSA security grant funding program for buses, and other topics.

Statistics

Views

Total Views
262
Views on SlideShare
262
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Conduct an exercise (see the Multiyear Exercise Plan in your SEP, which is also listed on Slide 2 of this presentation). Quarterly exercises are a very practical way to ensure your company is prepared for a security issue.Security Topic: comb through the various resources you now have at your disposal, such as HSIN, TRIAD Reports, info from the FBI InfraGard website (www.infragard.net), and other resources. Discuss this with the group.Update on latest threats.Security trends: with the ALERT Team assembled, discuss any security trends or problems within the company. Suggestion – invite local law enforcement, fire, EMS, to brief the ALERT Team on this topic.Exercise Plans and After Action Reports are to be filed in your SEP, Appendix J. This will demonstrate to auditors that you are putting ‘shoe leather’ to the plans contained in your SEP, taking an active approach to security issues.
  • Discuss:“Bring everyone into the room(s)” – who knows where the room is?“Shut and lock the doors” – what are the procedures to do this? Ask customers … to stay” – why is this important?Call emergency contacts – all involved should call
  • 1. “Call forwarding” – use the Call Forwarding feature on your phone to receive important calls.“Change business phone announcement …” - Turn on call-forwarding or alternative telephone answering systems or services. If the business has voice mail or an automated attendant, change the recording to indicate that the business is closed, and that staff and visitors are remaining in the building until authorities advise it is safe to leave.“Turn off HVAC system …” – Have employees familiar with your building’s mechanical systems turn off all fans, heating and air conditioning systems. Some systems automatically provide for exchange of inside air with outside air – these systems, in particular, need to be turned off, sealed, or disabled. Water – fill a sink with water, fast.
  • 1. “Avoid overcrowding” - Select interior room(s) above the ground floor, with the fewest windows or vents. The room(s) should have adequate space for everyone to be able to sit in. Avoid overcrowding by selecting several rooms if necessary. Large storage closets,utility rooms, pantries, copy and conference rooms without exterior windows will work well. Avoid selecting a room withmechanical equipment like ventilation blowers or pipes, because this equipment may not be able to be sealed from theoutdoors.Ideal … hard wired telephone” – cell phone lines may be congested. Also, you can use your GETS account on a land line.“Evac Kit and disaster supplies” - Gather essential disaster supplies, such as nonperishable food, bottled water, battery-powered radios, first aid supplies, flashlights, batteries, duct tape, plastic sheeting, and plastic garbage bags.
  • There may be a poster associated with what we are discussing or the poster may be totally unrelated and just be an interesting security topic
  • Speaker would speak about Homeland Security Programs in the local area or just plain security programs or exercises or training or do they need any buses for any disasters or exercises. SWAT Teams have practiced on buses. If no speaker available, ask ALERT Team members for contacts to talk about InfraGard meetings, something they heard at BISC, or at a local security meeting for state or city.Also any robberies, threats, new security purchased. Any trespassing. Fence was cut, no one is wearing security badges, rash of robberies in the local area, doors being left unlocked, etc.
  • SGT Dustin Davis(Santa Clara Sheriffs RATTF) stated the device was a functional M116A1 grenade simulator (picture attached) found inside a small shaving kit type bag. There were no suspects or witnesses and the item did not deploy. If it did deploy the risk to public safety would be minimal. The bag was found on last bench at the stop, seated on top of the bench, toward the edge. He also mentioned a person would have to dig into the bag to see the device. SGT Davis did not feel the scene provided any indication the device of intentionally left, more likely it fell out of someone's bag, NFI. The NY incident has been closed and there is no additional information to pass on. However, they may still be able to provide a picture of the device. As soon as it comes in I will pass it on.
  • Question and Answer session. Document.

Quarterly Security Meeting (Shelter in Place) Presentation Transcript

  • 1. Quarterly Security Meeting: Shelter in Place www.cateyes.us Copyright © 2001-2007 Copyright © 2013
  • 2. Quarterly Security Meeting• Exercise• Security topic• Update on latest threats to post to Terrorism Awareness Board• Security trends or problems within the company• Exercise Plans and After Action Reports Copyright © 2013
  • 3. Quarterly Security Meeting• Exercise• Security topic• Update on latest threats to post to Terrorism Awareness Board• Security trends or problems within the company• Exercise Plans and After Action Reports Copyright © 2013
  • 4. Exercise: Shelter in Place Copyright © 2013
  • 5. Exercise: Shelter in Place Copyright © 2013
  • 6. Security Plan: Table of Contents Copyright © 2013
  • 7. What “Shelter in Place” Means• Precaution to keep you safe while remaining indoors• Select a small, interior room with no or few windows• Protection from hazardous materials released into the atmosphere• Temporary measure, usually 3 to 4 hours Copyright © 2013
  • 8. How to Shelter in Place• Close the business• Bring everyone into the room(s)• Shut and lock the doors• Ask customers, clients, visitors to stay, not leave the building• Call emergency contacts to let them know you are safe Copyright © 2013
  • 9. How to Shelter in Place• Call forwarding• Change business phone announcement to say the business is closed• Close and lock exterior openings• Turn off HVAC system and anything that exchanges with outside air and water Copyright © 2013
  • 10. How to Shelter in Place• Avoid overcrowding – select multiple rooms if necessary• Ideal to have a hard-wired telephone in the room(s)• Evacuation Kit and disaster supplies• Consider the maintenance pits in the garage for radiological shielding or tornadoes Copyright © 2013
  • 11. Evacuation Kits (SEP, page 17)• Copy of SEP• Reference Guides• Emergency Phone Numbers (cellular phones, staff call out no.)• Current Daily Operations/Assignments• Status Report Forms• Copy of Site Floor Plan• Notepad / MAP/ ATLAS• Pens , Pencils , and Markers• Flashlight / with extra batteries• Portable AM/FM or Scanner Radio• Wall/Car Charger for Cell Phone/Portable Radios• Camera (Cell/Disposable)• Lap Top Computer / Disk / Thumb Drives / Cell Phone Internet Adaptor• AC/DC Converter Copyright © 2013
  • 12. Critical Supplies• Bottled water• Flashlight(s)• Radio (battery-operated)• First Aid supplies• Duct tape and plastic sheeting• Plastic garbage bags Copyright © 2013
  • 13. Exercise: Shelter in Place• Document “Lessons Learned” – Examples • No Evac Kit or missing items • No radio or TV on facility • Update the SEP with some of these new ideas • Only 1 person knows how to shut off HVAC• Write up, post in Appendix J of SEP Copyright © 2013
  • 14. Quarterly Security Meeting• Exercise• Security topic• Update on latest threats to post to Terrorism Awareness Board• Security trends or problems within the company• Exercise Plans and After Action Reports Copyright © 2013
  • 15. Bus IndustryPeer Advisory Group Staying Ahead of the Curve Peer Advisory Group (PAG)
  • 16. Surface Transportation SecurityNational Mass Transit, Passenger Rail, & OTRB Security Strategy
  • 17. Risk-Based Security Strategy • Aligned with TSA Principles of Risk-Based Security across all modes of Surface Transportation • Focuses resources at higher relative risk locations and assets • Completely responsive to risk • Intelligence driven Implementation of Risk Reduction Programs • Levels of unpredictable operational deterrence and response measures driven by intelligence-based threat scenarios and levels • Measures include: • Unpredictable operational deterrence • Preparedness and response exercises • Improve critical infrastructure resilience • Front employee training • Public Awareness “If you see something, say something” 17
  • 18. Achieving Desired Outcomes The privacy and civilStrategic Overall casualties The general public People and goods liberties of individuals perceives surface move freely within and entities that own,Outcomes from terrorist attacks transportation to be surface transportation operate or use are limited safe and secure modes transportation systems are protectedApproaches DETERRENCE DETECTION RESILIENCE(to meet theseoutcomes) Respond to allProxy Create a minimum emergency related Limit disruption and 25% perceived restore normal orMeasures of likelihood of events within 10 min, alternative operations non-emergency within within 12 hoursEffectiveness interdiction 20 min 18
  • 19. Objective: Effective DeterrenceTarget: Create a minimum 25% perceived likelihood ofinterdiction at high risk locations and critical assets Achieving this standard requires LIKELIHOOD OF INTERDICTION presence and credibility 100% • Presence of visible security measures — Security and Canine Patrols are randomly present at high risk locations and critical assets in system for at least 25% of operating hours (120 minutes/8 hours). Standard — CCTV Cameras cover of 100% of the high risk locations threshold if and critical assets in system. interdiction results in • Credibility of security measures 25% detain and arrest — For the purposes of this analysis, credibility of security measures—the likelihood that a given security measure Minimum would achieve its objective—was assumed to be 100% 2% threshold if (anything less would require more presence) interdiction results in detain and arrest 0% 19
  • 20. Objective: Effective Detection & Response Target: Respond to all emergency related events within 10 min, non-emergency within 20 min SECURITY PERSONNEL Resolution involves having the ability to RESPONSE TIMEdetect a threat and respond appropriately Respond to at least 80% of • Detect 100% of suspicious activity that matters immediate incidents in 20 — The travelling public, frontline employees, and security 20 min. mins. (British , Transport personnel are sufficiently informed and motivated to Police detect suspicious activity and make relevant and timely standard)⁴ reports. Mid-range average • Ability to respond appropriately within 10 10 response time min. minutes to identified suspicious activity Average Emergency Response Time — Within 20 minutes, reporting of suspicious activity must be 5 min. Goal (BART)⁵ communicated, analyzed, and, as appropriate, security Emergency personnel dispatched and arrive on scene. 3 min. response time to Oklahoma 0 min. City bombing⁶ 20
  • 21. Objective: Effective ResilienceTarget: Limit service disruption and restore to 90%normal or alternative operations within 12 hoursAchieving this standard requires limited direct SYSTEM RESTORATION TIME consequences, robust transportation Re-opening of alternatives, and 12 hour restoration time. affected track after June 2009 WMATA Red• Limited direct consequences of incidents 5 days Line crash⁸ — Infrastructure hardening and incident response activities Mid-range average system limit immediate casualties and damage to infrastructure. restoration 12 time• Robust transport alternatives to reroute flows hours Restoration — System redundancy and individual resilience efforts after 1995 6 hours Paris metro create alternative transportation routes & alternatives to attack⁹ transportation. Conclude police activity • 12 hours to restoration of full system service which disrupts 1.5 train service — Recovery capabilities ensure timely restoration of hours (British Trans. system to full operating status. Police 0 hours standard)¹⁰ 21
  • 22. QUESTIONS? Doyle Raines Ron Masciana Division Director Technical Counselor Surface Division Surface Division Office of Security Policy Office of Security Policy and and Industry Engagement Industry Engagement 571-227-3982 571-227-5672 Christopher T. McKay Fred Goodine Branch Manager Section Chief Mass Transit and Passenger Rail Mass Transit and Passenger Rail Surface Division Surface Division Office of Security Policy and Office of Security Policy and Industry Industry Engagement Engagement 571-227-2160 571-227-1725 This Strategy was developed in coordination with the Mass Transit Sector Coordinating Council (Transit Security Peer Advisory Group) Chief Paul McMillan, Massachusetts Bay Transit Authority, Chairman. 22
  • 23. Peer BISC Project Updates Advisory Group• Cyber Security• Human Trafficking• Active Shooter Protocols in a Moving or Stationary Bus9 April 2013 Bus Industry Peer Advisory Group (PAG) 23
  • 24. Peer Collaborative Projects Going Forward Advisory Group• Convert “Mass Transit Security Strategy” to Motorcoaches• OTRB TRIAD Reports Motorcoach Transportation Security Strategy9 April 2013 Bus Industry Peer Advisory Group (PAG) 24
  • 25. Bus Industry Safety Council (BISC)• Consider attending and joining one of the committees• Reimbursed $500 and 4 meals paid• June 11 and 12 in Herndon, VA• For more information, email Matt Cahill mcahill@buses.org Copyright © 2013
  • 26. Complete details at www.buses.orgCopyright © 2013
  • 27. Quarterly Security Meeting• Exercise• Security topic• Update on latest threats to post to Terrorism Awareness Board• Security trends or problems within the company• Exercise Plans and After Action Reports Copyright © 2013
  • 28. See poster – next slide After discussion, the document will be posted on the Terrorism Awareness Board Copyright © 2013
  • 29. Quarterly Security Meeting• Exercise• Security topic• Update on latest threats to post to Terrorism Awareness Board• Security trends or problems within the company• Exercise Plans and After Action Reports Copyright © 2013
  • 30. General Discussion or Security Topic Copyright © 2013
  • 31. 2 Simulated Explosives Found in NY and CA
  • 32. Bus Industry Peer Advisory9 April 2013 33 Group (PAG)
  • 33. Bus Industry Peer Advisory9 April 2013 34 Group (PAG)
  • 34. Bus Industry Peer Advisory9 April 2013 35 Group (PAG)
  • 35. Bus Industry Peer Advisory9 April 2013 36 Group (PAG)
  • 36. Bus Industry Peer Advisory9 April 2013 37 Group (PAG)
  • 37. $189,000,000• Discretionary Funds from Congress to TSA• Recommend you write your congressmen and tell them you would like an Intercity Bus Grant with some of those funds Copyright © 2013
  • 38. Contact Your Congressmen Copyright © 2013
  • 39. Contact Your Congressmen Copyright © 2013
  • 40. Contact Your Congressmen Copyright © 2013
  • 41. Contact Your Congressmen Copyright © 2013
  • 42. “I h e a r dTSAr e c e i v e d$189 m i l l i o ni nd i s c r e t i on a r y f u n d s .Pl e a s ec o n t a c tt h e TSAA d mi n i s t ra t o r a n dl e t h i mk n o w wec a n u s et h i s f o r
  • 43. Quarterly Security Meeting• Exercise• Security topic• Update on latest threats to post to Terrorism Awareness Board• Security trends or problems within the company• Exercise Plans and After Action Reports Copyright © 2013
  • 44. Document This Training• Write a report describing today’s training or wait to receive the Minutes from CAT Eyes• NOTE: examples can be found in Appendix J of your SEP• Post your report in Appendix J Copyright © 2013
  • 45. Next Quarterly Security Meetingwill be held in July 9, 17 and 26. You will receive an invitation. Bomb Threat and Building Evacuation Copyright © 2001- 2007 Copyright © 2013
  • 46. Copyright © 2013
  • 47. Documentation• To receive Minutes and other documentation from today’s meeting: – Go to www.dropbox.com – Sign in: CEQSM@hotmail.com – Password: bus1234 – Open the file labeled “Documents to Accompany QSM (Q2 - Shelter)” Copyright © 2013
  • 48. Documentation• Posters should be displayed on your Terrorism Awareness Board• Post the Minutes in Appendix J of your SEP• The meeting was also recorded – “Quarterly Security Meeting (Q2 - Shelter) – narrated” in the same dropbox account Copyright © 2013
  • 49. Conclusion• This concludes today’s meeting• Direct any questions to frankm@cateyes.us Copyright © 2013