This document provides a critical asset identification and protection guide for Embry-Riddle Aeronautical University. It identifies the university's critical assets, assesses their vulnerabilities, potential consequences of damage, and recommends cost-effective countermeasures. The top four critical assets identified are the library, Lehman Building, dormitories, and student center. Countermeasures recommended to protect these assets include boarding up windows, placing sandbags, evacuating students, and moving computers to higher floors. The guide estimates costs of countermeasures and finds most to be low-cost options that effectively forecast, mitigate risks, and ensure continuity of operations. It aims to improve ERAU's emergency planning and security for critical assets.
Keith Fields has over 30 years of experience in security and law enforcement, including managing security training programs for NASA. He has held positions as a Security/Law Enforcement Supervisor, Director of NASA's Protective Services Training Academy, and Manager of Protective Services Training at Ames Research Center. His experience includes developing curriculum, instructing, supervising staff, maintaining accreditation, and managing budgets, records, and equipment for security training programs.
Keith Fields has over 30 years of experience in security and law enforcement, including managing security training programs for NASA and supervising security operations at various military installations. His experience includes creating training curriculum, conducting weapons qualifications, overseeing security operations and emergency response, and supervising security personnel. He is seeking a permanent full-time position utilizing his extensive experience in security, law enforcement, and protective services training.
This document provides a summary of an all-source intelligence analyst with over 6 years of experience. The analyst has expertise in signals, open-source, financial, cyber, geospatial, and human intelligence collection and analysis. They are recognized as a subject matter expert on threats to air operations from adversary aircraft, missiles and weapons. The experience section outlines the analyst's roles providing intelligence support and training to various fighter squadrons and during a deployment to Iraq.
This summary provides an overview of Jennifer Ng's background as a mid-level intelligence analyst with over 7 years of experience. She has a Master's in Intelligence Studies and served as an Intelligence Officer in the U.S. Air Force, conducting analysis on regions in East Asia, Southeast Asia, and South America. Her experience includes directing analysis teams, producing intelligence reports, briefing leaders, and supporting military operations. She is proficient in analysis tools and seeks new opportunities to utilize her skills.
Michael Demark has over 10 years of experience in intelligence analysis, security management, and security operations within the United States Marine Corps and Defense Intelligence Agency. He holds a Top Secret security clearance with SCI and PR eligibility. His experience includes conducting intelligence analysis, managing security programs, producing briefings and reports, and advising on security policies.
This document provides a summary of Todd Chase's experience and qualifications. It summarizes that he has over 25 years of experience in aviation safety, program management, incident investigation, and search and rescue. He has held leadership roles managing safety programs and 36 personnel conducting combat operations. He is trained in aviation incident investigation and has led investigations into multiple mishaps. Currently he advises BP on aviation safety and risk management.
Royal Gold provided an overview of its business and outlook. It reported record revenue, volume, and EBITDA in the past year driven by growth in its largest royalty and stream interests. It expects contributions from these interests as well as new streams on Pueblo Viejo, Rainy River, Andacollo, and Wassa/Prestea to further diversify its portfolio and drive continued growth. Royal Gold also returned capital to shareholders through a dividend increased in 2016 to $0.92 per share, representing a 21% compound annual growth rate since 2001.
This document summarizes a company's plan to monetize CO2 emissions by developing bio-fertilizer and beverage-grade CO2 products. It highlights a large market opportunity for bio-fertilizers globally. The company's phase one plan involves developing a proprietary bio-fertilizer blend using photobioreactors. They are seeking $500,000 in catalyst funding to build a production system and processing equipment. Financial projections estimate the company could achieve profitability by year two and generate over $500,000 in net profit by year three serving just one customer.
Keith Fields has over 30 years of experience in security and law enforcement, including managing security training programs for NASA. He has held positions as a Security/Law Enforcement Supervisor, Director of NASA's Protective Services Training Academy, and Manager of Protective Services Training at Ames Research Center. His experience includes developing curriculum, instructing, supervising staff, maintaining accreditation, and managing budgets, records, and equipment for security training programs.
Keith Fields has over 30 years of experience in security and law enforcement, including managing security training programs for NASA and supervising security operations at various military installations. His experience includes creating training curriculum, conducting weapons qualifications, overseeing security operations and emergency response, and supervising security personnel. He is seeking a permanent full-time position utilizing his extensive experience in security, law enforcement, and protective services training.
This document provides a summary of an all-source intelligence analyst with over 6 years of experience. The analyst has expertise in signals, open-source, financial, cyber, geospatial, and human intelligence collection and analysis. They are recognized as a subject matter expert on threats to air operations from adversary aircraft, missiles and weapons. The experience section outlines the analyst's roles providing intelligence support and training to various fighter squadrons and during a deployment to Iraq.
This summary provides an overview of Jennifer Ng's background as a mid-level intelligence analyst with over 7 years of experience. She has a Master's in Intelligence Studies and served as an Intelligence Officer in the U.S. Air Force, conducting analysis on regions in East Asia, Southeast Asia, and South America. Her experience includes directing analysis teams, producing intelligence reports, briefing leaders, and supporting military operations. She is proficient in analysis tools and seeks new opportunities to utilize her skills.
Michael Demark has over 10 years of experience in intelligence analysis, security management, and security operations within the United States Marine Corps and Defense Intelligence Agency. He holds a Top Secret security clearance with SCI and PR eligibility. His experience includes conducting intelligence analysis, managing security programs, producing briefings and reports, and advising on security policies.
This document provides a summary of Todd Chase's experience and qualifications. It summarizes that he has over 25 years of experience in aviation safety, program management, incident investigation, and search and rescue. He has held leadership roles managing safety programs and 36 personnel conducting combat operations. He is trained in aviation incident investigation and has led investigations into multiple mishaps. Currently he advises BP on aviation safety and risk management.
Royal Gold provided an overview of its business and outlook. It reported record revenue, volume, and EBITDA in the past year driven by growth in its largest royalty and stream interests. It expects contributions from these interests as well as new streams on Pueblo Viejo, Rainy River, Andacollo, and Wassa/Prestea to further diversify its portfolio and drive continued growth. Royal Gold also returned capital to shareholders through a dividend increased in 2016 to $0.92 per share, representing a 21% compound annual growth rate since 2001.
This document summarizes a company's plan to monetize CO2 emissions by developing bio-fertilizer and beverage-grade CO2 products. It highlights a large market opportunity for bio-fertilizers globally. The company's phase one plan involves developing a proprietary bio-fertilizer blend using photobioreactors. They are seeking $500,000 in catalyst funding to build a production system and processing equipment. Financial projections estimate the company could achieve profitability by year two and generate over $500,000 in net profit by year three serving just one customer.
This document lists various symbols and facts for 14 US states - California, Louisiana, New Mexico, Alabama, Florida, Kentucky, Tennessee, Colorado, Utah, and Maine. For each state, it provides the capital city, state bird, state nickname, state flower, and state tree. The states covered come from different regions of the country, including the West Coast, South, Midwest, and Northeast.
This document summarizes a company's revolutionary monetization platform that allows content providers to live stream television globally across devices, insert targeted ads seamlessly into live streams, and earn 4-8 times more revenue than other platforms despite ad blockers, all with no setup fees or additional charges beyond CDN billing and support.
What I Wish I Knew Before I Signed that Contract - San Antonio InnoTech
This document discusses best practices for negotiating contracts. It emphasizes the importance of collaboration between legal and business teams when negotiating contracts. Key elements that should be addressed in contracts include payment terms, intellectual property ownership, scope of work, and termination clauses. Effective contract negotiation involves understanding what is being agreed to, negotiating undesirable terms, and maintaining the contract after it is signed. Both knowledge and leverage are important for negotiations, and legal teams can help improve business understanding. Maintaining contracts after they are signed is also important to avoid disputes down the line. The document provides examples of both successful and unsuccessful contract negotiations and collaborations between legal and business teams.
This presentation provides an overview of Detour Gold Corporation as Canada's intermediate gold producer. Some key points:
- Detour Lake is Detour Gold's flagship asset with 16.4 million ounces of gold reserves and projected production of 525,000-545,000 ounces in 2016.
- Production is growing organically while costs are declining, with all-in sustaining costs expected to be $970-1,020 per ounce sold in 2016.
- The company is focused on optimizing operations at Detour Lake and pursuing organic growth opportunities through projects like West Detour and Zone 58N, as well as regional exploration properties.
- Detour Gold has significantly reduced debt since 2013 and aims to
This document summarizes a study that uses principal component analysis to explore the relationship between climate variables and dengue outbreaks in Lahore, Pakistan from 2011-2012. The analysis identified four principal components:
1) PC1 represented a "Windy and hot" factor combining maximum temperature, minimum temperature, and wind speed.
2) PC2 represented "Wetness" combining precipitation and humidity.
3) PC3 represented "Windy and dry" as a contrast between wind speed and precipitation.
4) PC4 represented "Humid but no rain" as a contrast between humidity and precipitation.
Time series plots of the principal components showed seasonal variation dominated by temperature. Correlation analysis
This document presents an analysis of the exponential distribution under an adaptive type-I progressive hybrid censoring scheme for competing risks data. Maximum likelihood and Bayesian estimation methods are used to estimate the distribution parameter. Specifically, maximum likelihood estimators are derived for the exponential distribution parameter. Bayesian estimators are also obtained for the parameter based on squared error and LINEX loss functions using gamma priors. Asymptotic confidence intervals and Bayesian credible intervals are proposed. A simulation study is conducted to evaluate the performance of the estimators.
Business opportunity bio fertilizer plantvaibhavtuls
TULS Management provides a business opportunity summary for setting up a bio-fertilizer plant. The summary outlines key details about the bio-fertilizer industry including objectives of organic farming, types of bio-fertilizers, their advantages, production process, quality standards, subsidies available, existing capacity and demand in India. TULS highlights their expertise and differentiation in strategic support for customized and sustainable bio-fertilizer projects.
LINKSTAR TECHNOLOGIES LIMITED, based in the USA, with Worldwide Distribution and Sales office in Hongkong is a synergy in Communications Technology, with Design, Development & EMS Facilities (Electronics & Telecommunications) in India. Linkstar provides solutions and value to Manufacturers and System Integrators. LINKSTAR has expertise and resources to design, develop & manufacture “Electronics & Communication” products from concept for System Integrators and OEMs.
Our areas of expertise range from Services in the “Design and Development” (Electronics and Telecommunication”), and EMS (Electronics Manufacturing Services) for OEMs.
We invite Regional Distributors & Channel Partners for our products and services.
Metodo del Camino Critico, AGO - OCT 2016 Grupo #3 MACJose Alburquerque
El documento presenta una introducción al método del camino crítico. Explica que este método surgió a partir de los métodos PERT y CPM desarrollados en los Estados Unidos en 1957 para programar proyectos complejos. Define el camino crítico como un proceso administrativo para planear, programar, ejecutar y controlar las actividades de un proyecto dentro de un tiempo y costo óptimos. Finalmente, señala que este método es muy flexible y puede aplicarse a proyectos grandes y pequeños.
Timothy Jones has over 15 years of experience in emergency management, including developing plans for major accidents and terrorist attacks. He has managed millions of dollars in emergency response equipment and built emergency response facilities. His experience includes instructing over 10,000 people on defense against weapons of mass destruction. He currently holds a Secret security clearance and works as an Integrated Emergency Operations Center Systems Manager and Training Support Specialist.
This document provides a methodology for conducting risk assessments of buildings to mitigate potential terrorist attacks. It outlines a 5-step process: 1) identifying threats, 2) assessing asset values, 3) evaluating vulnerabilities, 4) determining risks, and 5) considering mitigation options. The goal is to identify cost-effective security measures to minimize risks. Appendices include a Building Vulnerability Assessment Checklist and guidance for a Risk Assessment Database to organize risk scoring and mitigation data for multiple buildings.
Leader and trainer with experience developing emergency and disaster management training plans policies and procedures. Evaluation of training instructor, course materials, management with experience in administrative, personnel management, training, including logistic, customer service, employee development, and career development counseling.
India faces many natural and man-made disasters that hinder growth. The Incident Response System (IRS) provides a standardized framework to efficiently manage disaster response through coordinated communication and flexible organization. IRS follows ICS principles with an incident commander and sections for operations, planning, logistics, and information/media to effectively meet incident objectives.
This document discusses disaster drills, which are simulations of emergency situations conducted to educate personnel and test emergency response plans. It defines disaster drills and describes three common types: tabletop drills, functional drills, and full-scale drills. Key aspects of designing effective disaster drills are outlined, including defining objectives, crafting scenarios, and planning activities. Guidelines are provided for roles in drills, such as incident commanders and evaluators. The document emphasizes that regular drills are important to identify weaknesses in plans and increase staff confidence and coordination in responding to emergencies.
Timothy A. Head is a transitioning Army Lieutenant Colonel with over 25 years of experience in security operations including investigations, physical and electronic security, security forces, and security programs. He has expertise in areas such as organizational communications, risk management, and security policies/procedures. Most recently he served as a senior historian in Kuwait documenting operations against ISIS. Prior experience includes overseeing security for the Georgia National Guard with responsibilities like ensuring protection of assets, developing security plans/programs, and conducting investigations. He holds a Bachelor's degree in Criminal Justice and has received extensive security-related training and certifications.
Approved for public release; distribution is unlimited. Sy.docxjewisonantone
This document provides an overview of innovative uses of social media in emergency management based on case studies and literature review. It finds that public safety organizations are increasingly using social media to engage with communities before, during, and after emergencies to share timely information and gain situational awareness. The case studies highlight how government agencies and non-profits collaborated with communities through social media during recent natural disasters like hurricanes, earthquakes, floods and wildfires to coordinate responses and distribute updates. The document also outlines best practices for social media implementation identified in literature, including developing strategic and policy frameworks, actively monitoring content, and using mapping tools to provide visual context.
Approved for public release; distribution is unlimited. Sy.docxfestockton
Approved for public release; distribution is unlimited.
System Assessment and Validation for Emergency Responders (SAVER)
Innovative Uses of Social Media in
Emergency Management
September 2013
Prepared by Space and Naval Warfare Systems Center Atlantic
The Innovative Uses of Social Media in Emergency Management report was funded under
Interagency Agreement No. HSHQDC-07-X-00467 from the U.S. Department of
Homeland Security, Science and Technology Directorate.
The views and opinions of authors expressed herein do not necessarily reflect those of the
U.S. Government.
Reference herein to any specific commercial products, processes, or services by trade
name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its
endorsement, recommendation, or favoring by the U.S. Government.
The information and statements contained herein shall not be used for the purposes of
advertising, nor to imply the endorsement or recommendation of the U.S. Government.
With respect to documentation contained herein, neither the U.S. Government nor any of
its employees make any warranty, express or implied, including but not limited to the
warranties of merchantability and fitness for a particular purpose. Further, neither the
U.S. Government nor any of its employees assume any legal liability or responsibility for
the accuracy, completeness, or usefulness of any information, apparatus, product, or
process disclosed; nor do they represent that its use would not infringe privately owned
rights.
Cover images are courtesy of Federal Emergency Management Agency (FEMA) News
Photos.
Approved for public release; distribution is unlimited.
i
FOREWORD
The U.S. Department of Homeland Security (DHS) established the System Assessment and
Validation for Emergency Responders (SAVER) Program to assist emergency responders
making procurement decisions. Located within the Science and Technology Directorate (S&T)
of DHS, the SAVER Program conducts objective assessments and validations on commercial
equipment and systems and provides those results along with other relevant equipment
information to the emergency response community in an operationally useful form. SAVER
provides information on equipment that falls within the categories listed in the DHS Authorized
Equipment List (AEL). The SAVER Program mission includes:
Conducting impartial, practitioner-relevant, operationally oriented assessments and
validations of emergency responder equipment; and
Providing information, in the form of knowledge products, that enables decision-makers
and responders to better select, procure, use, and maintain emergency responder
equipment.
Information provided by the SAVER Program will be shared nationally with the responder
community, providing a life- and cost-saving asset to DHS, as well as to Federal, state, and local
responders.
The SAVER Program is supported by a network of Technical Agents who perf ...
This document provides a summary of Edward Romasko's qualifications and experience. It outlines his 28 years of experience in management and leadership roles in the U.S. Marine Corps in logistics, environmental safety, hazardous materials, and antiterrorism. It also lists his education and security clearance. His experience includes positions at KeyPoint Government Solutions, Home Depot, and Booz Allen Hamilton focusing on areas like background investigations, construction, and biometrics/law enforcement analysis.
Homeland Security Building RecommendationsChuck Thompson
http://www.gloucestercounty-va.com This is the building security recommendations for schools from Homeland Security. 317 pages up to date and complete. Is your school safe?
Midterm Assignment Instructions (due 31 August)
The mid-term essay will be the development of a general threat analysis of the US using the perspective of a foreign intelligence entity or service.
Foreign Intelligence Entity (FIE) Threat Analysis
The CIA's Counterintelligence Center Analysis Group (CIC/AG) identifies, monitors, and analyzes the efforts of FIEs against US persons, activities, and interests. CIC/AG analysts focus on two specific types of counterintelligence threats to US national security:
1. Transnational threats, such as the counterintelligence aspect of terrorism or the threats posed by emerging or changing technologies to the US Government, intelligence operations, and US Government information systems; and
2. Threats posed by FIEs and their activities.
Value:
This Assignment counts for 40% of your Final Course Grade for this course.
Objective:
This assignment, in accordance with undergraduate academic endeavors, provides an opportunity to evaluate assimilation of course topics, and sharpen and evaluate students' research & critical thinking skills. The assignment is driven & tested by a combination of course materials and external self-led research (depending upon essay[s] selected); analyzed and presented in essay(s) form.
Type:
This assignment consists of a research analysis paper approximately
six to eight pages in length, double-spaced
(This page count does not include a title page, abstract (optional), table of contents (optional), Reference/Bibliography page(s), or Endnotes page(s) (if used)). The source material should result primarily from self-led external research of scholarly articles. In addition, the course required reading materials may be used. The paper should have six to eight pages of content which are the written results of your research efforts.
Topic:
Develop a general threat analysis of a Foreign Intelligence Entity (FIE) of your choosing that is targeting the US. Examples include Russia's SVR, Iran's MOIS, Al Qaeda (or any of its 'subsidiaries'), North Korea's Reconnaissance Bureau, or Venezuela's Bolivarian National Intelligence Service, etc.
A FIE is any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. This term includes a foreign intelligence and security service [FISS] and international terrorist organizations. (JP 1-02; JP 2-01.2, CI & HUMINT in Joint Operations, 16 Mar 2011; and DoDD 5240.06, CIAR, 17 May 2011)
The components of your FIE threat analysis should include a full overview of the FIE (strength, location, organizational structures (if known), whether they operate under official cover or operate under unofficial cover--inside corporations, etc.). Detail the FIE's mission, and specific known and suspected US targets.
[Do not select the .
This document lists various symbols and facts for 14 US states - California, Louisiana, New Mexico, Alabama, Florida, Kentucky, Tennessee, Colorado, Utah, and Maine. For each state, it provides the capital city, state bird, state nickname, state flower, and state tree. The states covered come from different regions of the country, including the West Coast, South, Midwest, and Northeast.
This document summarizes a company's revolutionary monetization platform that allows content providers to live stream television globally across devices, insert targeted ads seamlessly into live streams, and earn 4-8 times more revenue than other platforms despite ad blockers, all with no setup fees or additional charges beyond CDN billing and support.
What I Wish I Knew Before I Signed that Contract - San Antonio InnoTech
This document discusses best practices for negotiating contracts. It emphasizes the importance of collaboration between legal and business teams when negotiating contracts. Key elements that should be addressed in contracts include payment terms, intellectual property ownership, scope of work, and termination clauses. Effective contract negotiation involves understanding what is being agreed to, negotiating undesirable terms, and maintaining the contract after it is signed. Both knowledge and leverage are important for negotiations, and legal teams can help improve business understanding. Maintaining contracts after they are signed is also important to avoid disputes down the line. The document provides examples of both successful and unsuccessful contract negotiations and collaborations between legal and business teams.
This presentation provides an overview of Detour Gold Corporation as Canada's intermediate gold producer. Some key points:
- Detour Lake is Detour Gold's flagship asset with 16.4 million ounces of gold reserves and projected production of 525,000-545,000 ounces in 2016.
- Production is growing organically while costs are declining, with all-in sustaining costs expected to be $970-1,020 per ounce sold in 2016.
- The company is focused on optimizing operations at Detour Lake and pursuing organic growth opportunities through projects like West Detour and Zone 58N, as well as regional exploration properties.
- Detour Gold has significantly reduced debt since 2013 and aims to
This document summarizes a study that uses principal component analysis to explore the relationship between climate variables and dengue outbreaks in Lahore, Pakistan from 2011-2012. The analysis identified four principal components:
1) PC1 represented a "Windy and hot" factor combining maximum temperature, minimum temperature, and wind speed.
2) PC2 represented "Wetness" combining precipitation and humidity.
3) PC3 represented "Windy and dry" as a contrast between wind speed and precipitation.
4) PC4 represented "Humid but no rain" as a contrast between humidity and precipitation.
Time series plots of the principal components showed seasonal variation dominated by temperature. Correlation analysis
This document presents an analysis of the exponential distribution under an adaptive type-I progressive hybrid censoring scheme for competing risks data. Maximum likelihood and Bayesian estimation methods are used to estimate the distribution parameter. Specifically, maximum likelihood estimators are derived for the exponential distribution parameter. Bayesian estimators are also obtained for the parameter based on squared error and LINEX loss functions using gamma priors. Asymptotic confidence intervals and Bayesian credible intervals are proposed. A simulation study is conducted to evaluate the performance of the estimators.
Business opportunity bio fertilizer plantvaibhavtuls
TULS Management provides a business opportunity summary for setting up a bio-fertilizer plant. The summary outlines key details about the bio-fertilizer industry including objectives of organic farming, types of bio-fertilizers, their advantages, production process, quality standards, subsidies available, existing capacity and demand in India. TULS highlights their expertise and differentiation in strategic support for customized and sustainable bio-fertilizer projects.
LINKSTAR TECHNOLOGIES LIMITED, based in the USA, with Worldwide Distribution and Sales office in Hongkong is a synergy in Communications Technology, with Design, Development & EMS Facilities (Electronics & Telecommunications) in India. Linkstar provides solutions and value to Manufacturers and System Integrators. LINKSTAR has expertise and resources to design, develop & manufacture “Electronics & Communication” products from concept for System Integrators and OEMs.
Our areas of expertise range from Services in the “Design and Development” (Electronics and Telecommunication”), and EMS (Electronics Manufacturing Services) for OEMs.
We invite Regional Distributors & Channel Partners for our products and services.
Metodo del Camino Critico, AGO - OCT 2016 Grupo #3 MACJose Alburquerque
El documento presenta una introducción al método del camino crítico. Explica que este método surgió a partir de los métodos PERT y CPM desarrollados en los Estados Unidos en 1957 para programar proyectos complejos. Define el camino crítico como un proceso administrativo para planear, programar, ejecutar y controlar las actividades de un proyecto dentro de un tiempo y costo óptimos. Finalmente, señala que este método es muy flexible y puede aplicarse a proyectos grandes y pequeños.
Timothy Jones has over 15 years of experience in emergency management, including developing plans for major accidents and terrorist attacks. He has managed millions of dollars in emergency response equipment and built emergency response facilities. His experience includes instructing over 10,000 people on defense against weapons of mass destruction. He currently holds a Secret security clearance and works as an Integrated Emergency Operations Center Systems Manager and Training Support Specialist.
This document provides a methodology for conducting risk assessments of buildings to mitigate potential terrorist attacks. It outlines a 5-step process: 1) identifying threats, 2) assessing asset values, 3) evaluating vulnerabilities, 4) determining risks, and 5) considering mitigation options. The goal is to identify cost-effective security measures to minimize risks. Appendices include a Building Vulnerability Assessment Checklist and guidance for a Risk Assessment Database to organize risk scoring and mitigation data for multiple buildings.
Leader and trainer with experience developing emergency and disaster management training plans policies and procedures. Evaluation of training instructor, course materials, management with experience in administrative, personnel management, training, including logistic, customer service, employee development, and career development counseling.
India faces many natural and man-made disasters that hinder growth. The Incident Response System (IRS) provides a standardized framework to efficiently manage disaster response through coordinated communication and flexible organization. IRS follows ICS principles with an incident commander and sections for operations, planning, logistics, and information/media to effectively meet incident objectives.
This document discusses disaster drills, which are simulations of emergency situations conducted to educate personnel and test emergency response plans. It defines disaster drills and describes three common types: tabletop drills, functional drills, and full-scale drills. Key aspects of designing effective disaster drills are outlined, including defining objectives, crafting scenarios, and planning activities. Guidelines are provided for roles in drills, such as incident commanders and evaluators. The document emphasizes that regular drills are important to identify weaknesses in plans and increase staff confidence and coordination in responding to emergencies.
Timothy A. Head is a transitioning Army Lieutenant Colonel with over 25 years of experience in security operations including investigations, physical and electronic security, security forces, and security programs. He has expertise in areas such as organizational communications, risk management, and security policies/procedures. Most recently he served as a senior historian in Kuwait documenting operations against ISIS. Prior experience includes overseeing security for the Georgia National Guard with responsibilities like ensuring protection of assets, developing security plans/programs, and conducting investigations. He holds a Bachelor's degree in Criminal Justice and has received extensive security-related training and certifications.
Approved for public release; distribution is unlimited. Sy.docxjewisonantone
This document provides an overview of innovative uses of social media in emergency management based on case studies and literature review. It finds that public safety organizations are increasingly using social media to engage with communities before, during, and after emergencies to share timely information and gain situational awareness. The case studies highlight how government agencies and non-profits collaborated with communities through social media during recent natural disasters like hurricanes, earthquakes, floods and wildfires to coordinate responses and distribute updates. The document also outlines best practices for social media implementation identified in literature, including developing strategic and policy frameworks, actively monitoring content, and using mapping tools to provide visual context.
Approved for public release; distribution is unlimited. Sy.docxfestockton
Approved for public release; distribution is unlimited.
System Assessment and Validation for Emergency Responders (SAVER)
Innovative Uses of Social Media in
Emergency Management
September 2013
Prepared by Space and Naval Warfare Systems Center Atlantic
The Innovative Uses of Social Media in Emergency Management report was funded under
Interagency Agreement No. HSHQDC-07-X-00467 from the U.S. Department of
Homeland Security, Science and Technology Directorate.
The views and opinions of authors expressed herein do not necessarily reflect those of the
U.S. Government.
Reference herein to any specific commercial products, processes, or services by trade
name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its
endorsement, recommendation, or favoring by the U.S. Government.
The information and statements contained herein shall not be used for the purposes of
advertising, nor to imply the endorsement or recommendation of the U.S. Government.
With respect to documentation contained herein, neither the U.S. Government nor any of
its employees make any warranty, express or implied, including but not limited to the
warranties of merchantability and fitness for a particular purpose. Further, neither the
U.S. Government nor any of its employees assume any legal liability or responsibility for
the accuracy, completeness, or usefulness of any information, apparatus, product, or
process disclosed; nor do they represent that its use would not infringe privately owned
rights.
Cover images are courtesy of Federal Emergency Management Agency (FEMA) News
Photos.
Approved for public release; distribution is unlimited.
i
FOREWORD
The U.S. Department of Homeland Security (DHS) established the System Assessment and
Validation for Emergency Responders (SAVER) Program to assist emergency responders
making procurement decisions. Located within the Science and Technology Directorate (S&T)
of DHS, the SAVER Program conducts objective assessments and validations on commercial
equipment and systems and provides those results along with other relevant equipment
information to the emergency response community in an operationally useful form. SAVER
provides information on equipment that falls within the categories listed in the DHS Authorized
Equipment List (AEL). The SAVER Program mission includes:
Conducting impartial, practitioner-relevant, operationally oriented assessments and
validations of emergency responder equipment; and
Providing information, in the form of knowledge products, that enables decision-makers
and responders to better select, procure, use, and maintain emergency responder
equipment.
Information provided by the SAVER Program will be shared nationally with the responder
community, providing a life- and cost-saving asset to DHS, as well as to Federal, state, and local
responders.
The SAVER Program is supported by a network of Technical Agents who perf ...
This document provides a summary of Edward Romasko's qualifications and experience. It outlines his 28 years of experience in management and leadership roles in the U.S. Marine Corps in logistics, environmental safety, hazardous materials, and antiterrorism. It also lists his education and security clearance. His experience includes positions at KeyPoint Government Solutions, Home Depot, and Booz Allen Hamilton focusing on areas like background investigations, construction, and biometrics/law enforcement analysis.
Homeland Security Building RecommendationsChuck Thompson
http://www.gloucestercounty-va.com This is the building security recommendations for schools from Homeland Security. 317 pages up to date and complete. Is your school safe?
Midterm Assignment Instructions (due 31 August)
The mid-term essay will be the development of a general threat analysis of the US using the perspective of a foreign intelligence entity or service.
Foreign Intelligence Entity (FIE) Threat Analysis
The CIA's Counterintelligence Center Analysis Group (CIC/AG) identifies, monitors, and analyzes the efforts of FIEs against US persons, activities, and interests. CIC/AG analysts focus on two specific types of counterintelligence threats to US national security:
1. Transnational threats, such as the counterintelligence aspect of terrorism or the threats posed by emerging or changing technologies to the US Government, intelligence operations, and US Government information systems; and
2. Threats posed by FIEs and their activities.
Value:
This Assignment counts for 40% of your Final Course Grade for this course.
Objective:
This assignment, in accordance with undergraduate academic endeavors, provides an opportunity to evaluate assimilation of course topics, and sharpen and evaluate students' research & critical thinking skills. The assignment is driven & tested by a combination of course materials and external self-led research (depending upon essay[s] selected); analyzed and presented in essay(s) form.
Type:
This assignment consists of a research analysis paper approximately
six to eight pages in length, double-spaced
(This page count does not include a title page, abstract (optional), table of contents (optional), Reference/Bibliography page(s), or Endnotes page(s) (if used)). The source material should result primarily from self-led external research of scholarly articles. In addition, the course required reading materials may be used. The paper should have six to eight pages of content which are the written results of your research efforts.
Topic:
Develop a general threat analysis of a Foreign Intelligence Entity (FIE) of your choosing that is targeting the US. Examples include Russia's SVR, Iran's MOIS, Al Qaeda (or any of its 'subsidiaries'), North Korea's Reconnaissance Bureau, or Venezuela's Bolivarian National Intelligence Service, etc.
A FIE is any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. This term includes a foreign intelligence and security service [FISS] and international terrorist organizations. (JP 1-02; JP 2-01.2, CI & HUMINT in Joint Operations, 16 Mar 2011; and DoDD 5240.06, CIAR, 17 May 2011)
The components of your FIE threat analysis should include a full overview of the FIE (strength, location, organizational structures (if known), whether they operate under official cover or operate under unofficial cover--inside corporations, etc.). Detail the FIE's mission, and specific known and suspected US targets.
[Do not select the .
This document is a resume for Eric M. Belt, who is seeking a position as a Federal Air Marshal. He has over 14 years of experience in the United States Air Force and military intelligence, including roles providing operations leadership and intelligence analysis. He demonstrates strong leadership, communication, and problem-solving skills. His experience includes positions managing intelligence analysis teams, developing collection plans, and assessing targets.
This document presents a framework for assessing the effectiveness and performance of intelligence products derived from full motion video analysis conducted by the Air Force Distributed Common Ground Station. The framework defines measures of effectiveness and performance based on Department of Defense attributes of intelligence excellence. It considers variables like timeliness, accuracy, and customer satisfaction that can be used to evaluate intelligence analysis and support. The goal is to develop a method for assessing intelligence functions at the tactical level to help identify opportunities for improvement and ensure goals are being met.
Frank C. Dupuy is a global loss prevention, investigations, and interrogations executive with experience leading teams in North America and Latin America. He has a background in the U.S. Army as an infantry soldier and received honors including the Combat Infantry Badge and Purple Heart. In his career, Dupuy has discovered millions in fraudulent activities, avoided potential losses for rig shutdowns, conducted risk assessments of oilfields, investigated senior management corruption, and developed corporate security and crisis management programs.
Steven Dische is an experienced global project and program manager with over 20 years of experience managing infrastructure protection programs, including physical and cyber security initiatives, for critical national infrastructures. He has extensive expertise assessing vulnerabilities and overseeing security enhancement programs internationally. His background includes positions managing security programs at national laboratories and advising government committees on infrastructure protection strategies.
The Design of an Undergraduate Program in Homeland Security - Jon E. Travis a...William Kritsonis
The Design of an Undergraduate Program in Homeland Security - Jon E. Travis and Chris W. Bradshaw - Published in NATIONAL FORUM JOURNALS - www.nationalforum.com - Dr. William Allan Kritsonis, Editor-in-Chief
The document describes a study that aimed to design an undergraduate curriculum in homeland security. A Delphi panel of homeland security directors reached consensus on important content areas. They identified 8 major areas: security issues, emergency management, risk management, threat analysis, technology, introduction to homeland security, fusion/intelligence, and training and development. The panel recommended 13 specific subject areas to include in the curriculum. The study provides a proposed curriculum framework to help colleges prepare students for careers in homeland security.
Travis, jon e the design of an undergraduate program in homeland security foc...William Kritsonis
NATIONAL FORUM JOURNALS
Founded 1982
NATIONAL FORUM JOURNALS are a group of national refereed, juried, peer-reviewed, blind-reviewed professional periodicals. Any article published shall earned five affirmative votes from members of our National Board of Invited Distinguished Jurors and must be recommended for national publication by members of the National Policy Board representing all National FORUM Journals. Journal issues are distributed both nationally and world-wide.
Our website features national refereed articles that are published daily within our National FORUM Journals Online Journal Division. Over 1,000 articles are available to scholars and practitioners world-wide. Over 250,000 guests visit our website yearly. About 56,000 articles are downloaded for academic purposes at no charge. We have about an 88% rejection rate. See: www.nationalforum.com
Founded in 1982, National FORUM Journals has published the scholarly contributions of over 5,200 professors with over 2,000 articles indexed. Our journals are indexed with many global agencies including Cabell’s Directories, ERIC, EBSCO, SWETS International, Library of Congress National Serials Data Program, and the Copyright Clearance Center, Danvers, Massachusetts.
Global Website: www.nationalforum.com
Dr. Jon E. Travis - NATIONAL FORUM JOURNALS - www.nationalforum.comWilliam Kritsonis
This article summarizes a study that used a Delphi panel of homeland security experts to design an undergraduate program in homeland security. The panel identified key content areas and subjects that should be included in such a program. They identified 8 major content areas as most important: security issues, emergency management, risk management, threat analysis, technology, introduction to homeland security, fusion/intelligence, and training and development. Within these areas, the panel identified 23 subjects as essential to the program, which were later narrowed down to 13 core subjects that experts agreed should make up the curriculum of an undergraduate homeland security degree.
4. Critical Asset Identification and Protection Guide 2012
4
Tables and Figures
Table 1 – Asset Identification..........................................................................................5
Table 2 – Vulnerability Factor…………………………………………………………….…..6
Table 3 - Countermeasure Relative Cost Range........................................................................8
Table 4 - Costs Applied to Assets……………………………………………………………..8
Table 5 - Statewide Zoning System………………………………………………………….12
Introduction
The consequences of a category 3 hurricane with landfall near ERAU's campus could result in
injury and death, disruption in the continuity of operations, as well as environmental damage
hindering operations.
The Critical Asset Identification and Protection Guide was prepared under the direction of
Robert T. Raffel, J.D. for the Critical Infrastructure and Risk Assessment course offered under
Embry-Riddle Aeronautical University (ERAU), Daytona Beach, FL. This assessment was
produced to address critical assets via means of a vulnerability assessment in the event of a
category 3 hurricane.
This assessment can benefit many schools and businesses along hurricane-prone coast lands. It
can be used by senior safety officials involved in the initial planning Stages, as well as mid-level
officials charged with developing the assessment plans and procedures, and staff personnel who
will likely conduct the assessments within ERAU. This assessment recommends that ERAU
organize a team of individuals tasked with the assessment who are familiar with the schools
mission, assets, policies and procedures.
Purpose of this Assessment
This assessment was developed as a guide for the protection of ERAU by:
Assessing the vulnerabilities of their physical assets such as buildings, roads, and
equipment etc;
Developing possible countermeasures to forecast, mitigate, and provide for the continuity
of operations consequences due to a category 3 hurricane;
5. Critical Asset Identification and Protection Guide 2012
5
Estimating the capital, operating, and maintenance costs of such countermeasures; and
Improving safety operational planning for better protection against future natural
disasters.
Team Composition
This assessment was conducted by an ERAU student team comprised of individuals of various
backgrounds and levels of study; each pursuing a Bachelor of Science degree in Homeland
Security. Each team member is knowledgeable in critical asset identification and cost benefit
analysis, by certifying in FEMA’s National Infrastructure Protection Plan.
Krystal Urban
New senior transfer to ERAU possessing adaptability and quick learning skills. She is
currently serving in the U.S. Army Reserves under the HHD 377th MI BN. She demonstrated
her cognitive aptitude and analytical ability by graduating at the top of her U.S. Army
Intelligence Analyst Course. Immediately upon her return, she sought out additional
intelligence training completing a two-week analytical course, two-week Distributed
Common Ground System-Army certification, and 40-hour engineering intelligence and
reconnaissance course. She is frequently sought out for her analytical knowledge and ability
to effectively communicate concepts by subordinates, peers and seniors alike.
Paul Dias
Junior ERAU student. He possesses an ability to work quickly regardless of deadlines. He is
a member of the U.S. Army Reserve Officer Training Corps. He has obtained multiple
FEMA courses to include IS-235b Emergency Planning, IS-700a National Incident
Management System, and IS-130 Exercise Evaluation and Improvement Planning.
Josh Guerrero
Junior ERAU student. He has participated in building an emergency management plan for
Los Angeles International airport, which identified natural disasters, including earthquakes.
Throughout his three years in college he has obtained multiple FEMA courses to include IS-
235b Emergency Planning, IS-700a National Incident Management System, and IS-130
Exercise Evaluation and Improvement Planning.
Matthew Otto
Junior ERAU student. Experience in hurricane planning and countermeasures. Worked for 3
years as a professional property maintenance personnel, dealing with pre hurricane
preparedness as well as post hurricane clean up. Knowledgeable in the field of emergency
6. Critical Asset Identification and Protection Guide 2012
6
preparedness. Prior work expertise in business, dealing with cost/benefit analysis on potential
investments.
Brian Wierson
Born to a military family, Brian has traveled extensively and participated in numerous
humanitarian efforts. Throughout his travels overseas, he has experienced typhoons,
tsunamis, earthquakes, and other natural disasters. He has participated in building an
emergency management plan for Honolulu City Hall, which identified natural disasters,
including hurricanes, and how to protect Honolulu City Hall using the Emergency
Management Cycle. He has taken multiple FEMA courses to include IS-120a Introduction to
Exercises, IS-547a Continuity of Operations, and IS-130 Exercise Evaluation and
Improvement Planning.
Step 1 - Critical Assets
Objective
The team identified all critical assets of ERAU in order to ensure minimal cost damage from a
category 3 hurricane and the continuity of operations for the university.
The team identified ERAU’s assets through a step by step method. First, our team identified all
known assets, and put them into four categories: Infrastructure, Facilities, Equipment, and
Personnel, as seen in Table 1.
Identification
Table 1- Asset Identification
Infrastructure Facilities Equipment Personnel
Asset Value Asset Value Asset Value Asset Value
Storm Drains 11 Classrooms 27
Maintenance
Equipment
20 Students 25
Roadways 13
University
Center
27
Classroom
Equipment
1 ERAU Staff 25
Alarm
Systems
22 Dorms 30
University
Fleet
20 Faculty 25
Sewer 17 Maintenance 28 Simulators 22
7. Critical Asset Identification and Protection Guide 2012
7
Building
IT systems 20 Labs 27
HVAC 21
Lehman
Building
31
Water 20 Hangers 8
Electricity 26 Library 27
Fuel 17
Worldwide
Center
15
Admin
Building
15
Assessment
After identifying all assets, our team assigned values to each asset (shown above). From there,
our team identified the assets which had high numbered values (in red). These values where
given due to the criticality of the asset and the impact on the continuity of operations they would
have on ERAU if damaged by the category 3 hurricane.
Step 2 – Vulnerability Assessment
Objective
The vulnerability assessment is designed to systematically identify and evaluate critical assets in
terms of their susceptibility to, and the consequences of, a category 3 hurricane. Vulnerability of
each asset was given a value of 1-4 pertaining to each of the categories: level of importance (A),
attendance and users (B), asset construction (C), access (D), receptor impacts (E), and volume
(F). This process identifies the most exposed and weakest assets that can be exploited by
terrorists. Once these values were assigned, the team applied the values to the vulnerability
assessment formula (Shown in Table 2).
Identification
Table 2 – Vulnerability Factor = (A*B) + (C*D) + (E*F)
Critical Asset
Vulnerability Factor Total
Score(A*B) + (C*D) + (E*F)
8. Critical Asset Identification and Protection Guide 2012
8
Lehman 4 4 3 4 4 3 40
Dorms 3 4 4 4 4 3 40
Maint. Facility 2 2 3 4 4 3 28
Labs 2 4 3 2 2 2 18
StudentCenter 4 4 3 4 4 3 40
Classrooms 4 4 3 2 4 3 34
Library 4 4 4 4 4 4 48
Electrical 4 4 1 4 2 2 24
Faculty 4 4 2 3 3 3 31
Staff 3 4 2 3 3 3 27
Students 4 4 1 3 3 3 28
AlarmSystems 3 4 1 4 2 2 20
Simulators 3 2 2 1 2 2 12
HVAC 2 4 2 2 2 2 16
IT Sytems 3 4 1 1 2 2 17
Water 3 4 3 4 2 2 28
Admin.Facility 2 2 3 4 4 3 28
Fleet 2 3 2 3 2 3 18
Maint. Equipment 1 2 2 3 2 2 12
Fuel 1 3 1 2 2 2 9
Sewer 2 4 4 2 2 2 18
Computers/Printers 3 4 1 4 2 3 22
W.W. Facility 1 2 3 4 4 3 26
Storm Drains 2 4 3 2 2 2 18
Roads 3 4 4 4 2 2 32
Hangers 1 2 3 2 2 2 12
Assessment
After a vulnerability assessment, it was realized that our top four assets were the most crucial to
the continuity of operations of ERAU. Inside of the school’s library, there are numerous amounts
of NTSB reports and other aviation files that most other schools do not have. ERAU’s library has
the largest collection of aviation information and record in the world which makes it pertinent to
the school. The Lehman building is the number one building at ERAU that deals with their
engineering department. Since ERAU has the number one aerospace engineering program in the
world, the Lehman building is considered a critical asset to the continuity of operations. Without
the dormitories and student center, ERAU cannot provide a proper living condition for their
students. If not for the students, ERAU would not make the income it needs to sustain itself.
Therefore, the students are also a critical asset to the school.
Step 3 – Consequence Assessment
Objective
9. Critical Asset Identification and Protection Guide 2012
9
The consequence assessment helps identify assets which, if damaged, produce the greatest risks
for undesirable outcomes given a specific set of circumstances and conditions. This assessment is
based on an integrated analysis of the data collected on key assets, realistic and credible threats,
and known or specifically identified vulnerabilities (comparison of criticality and vulnerability
values).
Identification
• Library
• Lehman Building
• Dormitories
• Student Center/University Center
• Classrooms
• Faculty
• Maintenance Facilities
• Students
• Water Source
• Staff
Assessment
Prior to the conclusion of the consequence assessment, it has been decided that the high priority
buildings at ERAU that were most vulnerable to consequence were the Lehman Building,
Library, Student Center, and Dormitories. With the vast amount of aviation documentation, the
library is very vulnerable to any form of weather and water damage. If the water can reach a high
enough level, then there is a chance that the documents can be ruined. The Lehman building is
also very susceptible to water damage due to the “Zeus” computer that contains all of the
school’s data. With the immense amount of windows in the dormitories there is a large
possibility of their destruction. If destroyed, the living condition of the dormitories would be
unsuitable for the student. The student center is surrounded by a majority of windows on its
sides. This glass is very fragile and even more susceptible to damage compared to the
dormitories. A large number of the buildings on the ERAU campus have the same consequence
vulnerabilities. One simple solution could be applied to all of the buildings and solve the
consequence issues.
Step 4 - Countermeasures
Objective
Identify countermeasures to protect the critical assets from the threats and fix vulnerabilities
assessed previously. The team developed countermeasures to protect the four critical assets
10. Critical Asset Identification and Protection Guide 2012
10
identified. These strategic countermeasures are meant to protect the integrity of the critical
assets.
Identification
Board up windows
Buy and place sandbags strategically around doors
Evacuate students from Embry-Riddle ahead of time
Move computers from bottom and top floor and place on top
Buy tarps
Assessment
The implementation of these countermeasures will deter and defend the critical assets from any
damage, and will insure the continuity of operations for the school in order to maintain
instruction for students and a continued income for the university.
Step 5 – Cost Estimation
Objective
In this step, all countermeasures are evaluated on their range of cost. The cost range includes the
cost of implementation, operating and maintenance costs of selected countermeasures.
Approach
The countermeasures identified below are intended to forecast, mitigate or ensure the
Continuation of operation (COOP). In most cases the countermeasure will mitigate the potential
loss of a critical asset and ensure its COOP. The countermeasures are assed as well by their
relative capital, maintenance and operating cost. The costs are based on a high (H), medium (m)
and low (L) value (Table 3). These values are applied to the countermeasures as shown in Table
4.
Table 3 - Countermeasure Relative Cost Range
Capital
Investment
Operating
Cost
Maintenance Cost
L <$100K <$50K <$25K
M $100K to $500K
$50K to
$250K
$25K to $100K
11. Critical Asset Identification and Protection Guide 2012
11
H >$500K >$250K >$100K
Table 4 - Costs Applied to Assets
Potential countermeasures
Forecast
Mitigate
COOP
Capital
Operating
Maintenance
Sandbags ✓ ✓ L L L
Clearing all drains and ditches ✓ L L L
Grounds maintenance (trimming
tree's)
✓ L L L
Securing movable objects ✓ L L L
Evacuation ✓ ✓ L L L
Evacuation of Fleet (air planes) ✓ ✓ H L L
Computer moved 4' from ground ✓ L L L
Tarps ✓ L L L
Full fuel tanks (generators/equipment) ✓ ✓ L L L
Securing equipment fuel tanks ✓ L L L
Exercises ✓ L L L
Hazardous waste area empty ✓ L L L
Hurricane tracking (EARU and
NOAA)
✓ L L L
Board up windows ✓ H H L
Hurricane film windows ✓ H l L
Emergency food stock ✓ H L H
Analysis
The potential Countermeasures contained in Table 4 have gone through the cost/benefit analysis
and have all developed low costs with the exception of the evacuation of the air plane fleet and
the protection of all windows on the ERAU Campus. The evacuation of the fleet has already
been addressed by the ERAU Disaster and Emergency Management/Recovery Plan. The risk
analyses team agrees with this countermeasure because of the potential high cost of replacement
of the fleet.
Since the protection of the windows can cost upward of a million dollars, it is not beneficial for
12. Critical Asset Identification and Protection Guide 2012
12
the high capital investment. The Florida building codes that the ERAU campus has been built
upon is determined by a statewide zoning system as shown in Table 5. Particularly stringent
restrictions apply to the High-Velocity Hurricane Zone. Volusia County is currently zoned to
have protection at the medium level up to 120 MPH. The level states that windows must be
impact resistant. Therefore it is not beneficial to protect to the windows on campus.
The remaining countermeasures listed however, the risk analysis team believes are very
beneficial for the mitigation of risk as well as the COOP. The countermeasures are all cost
effective and provide a high level of protection for the critical assets. Countermeasures can be
completed well before the storm arrives ensuring all personnel are off campus and safe.
Table 5 - Statewide Zoning System
STEP 6 - Security Operational Planning
Objective
This step will improve the operational security of all critical assets. By improving upon the post
hurricane preparations as well as the emergency management plans already in place by ERAU.
13. Critical Asset Identification and Protection Guide 2012
13
Approach
The ERAU campus has already provided a Disaster and Emergency Management/Recovery Plan
for the campus as well as a separate plan for the Hunt library. The risk assessment team agrees
with all of the countermeasures already in place. The countermeasure team will improve upon
the plan and place some of our suggested countermeasures in the pre existing plans.
Added Countermeasures Explanation
Sandbags
The pre hurricane season purchasing of 5000 sand bags is an excellent way to safeguard
against flooding. The cost of this countermeasure will be $1900 dollars. Sand bags come
in bulk of 1000 sand bags at $380 per 1000. Flooding is the most costly damage incurred
by businesses every hurricane season. Sandbags are a very low capital investment and
yield a large return on investment by safeguarding against flooding. Sandbags may also
be stored for many years and may be utilized when a hurricane is impending upon the
ERAU campus.
Post hurricane grounds maintenance
There are two parts to this countermeasure. First, post hurricane season clearing of
ditches and trimming of trees around the ERAU campus. Second, during Stage 2 of the
hurricane emergency plan, this countermeasure will be enacted to include, trimming of
trees, clearing of gutters and other hazards around the ERAU campus. These
countermeasures will safeguard against falling and flying tree debris as well as flooding.
The ERAU campus has funds and equipment already in place for this countermeasure.
Securing all unsecure objects around ERAU campus
This countermeasure will be enacted during Stage 2 of the hurricane emergency plan.
This countermeasure will include moving of all tables, chairs and any other unsecure
objects around the ERAU campus to secured areas. The ERAU campus has funds and
personnel already in place for this countermeasure
Filling all equipment fuel tanks
This countermeasure will be enacted during Stage 1 of the hurricane emergency plan.
This countermeasure includes filling of all equipment fuel tanks for the maintenance
equipment. Once filled during Stage 2 of the plan, the fuel tanks will be secured. The
reason behind filling the tanks pre hurricane is that fuel will be scarce after a hurricane
and will be needed to clean the ERAU campus and to ensure a swift reopening of
business.
14. Critical Asset Identification and Protection Guide 2012
14
Emptying of the ERAU hazardous waste area
This countermeasure will be enacted during Stage 1 of the hurricane emergency plan.
This countermeasure is in place to ensure there is not environmental contamination,
which could potentially cost ERAU thousands of dollars, if not more. This hazardous
waste area already has a contract to be cleared within 180 days of the last clean up,
because ERAU is classified as a small quantity generator. We suggest ERAU to add to
the contract that waste must be emptied once a tropical storm advisory is announced for
the Volusia country area.
Step 7 - Conclusion
Analysis
The risk analyses team recommends the use of ERAU's Disaster and Emergency
Management/Recovery Plan, with a few additional countermeasures recommended by the risk
analyses team. In combination, the ERAU campus will be as secure as possible. Below is the
combined Hurricane Emergency Plan and recommended countermeasures.
Combined Hurricane Emergency Plan and Recommended Countermeasures
Hurricane Season: June 1- November 30- update departmental plans. Communication &
Marketing and Campus safety & security will notify campus of emergency communication
methods (voice mail, e-mail, ERNIE, and the university website). EOT will meet each June to
plan for the current forecasted hurricane season. The director of Campus Safety will make
regular checks of the tropical weather forecast, and consult with meteorology faculty as needed.
Note: A hurricane Alert may be declared by the University EVP/CAO in the event of a
tropical storm. Tropical storm warning should be considered as potentially dangerous as a
hurricane watch.
Hurricane Alert: Decision by the Daytona Beach Exec VP/Chief Academic Officer (or
designee), to implement the hurricane plan. (Can occur at any of the Stage below)
Stage 1: Advisory: Hurricane threatens US Mainland. Advisories are broadcast over
radio and TV. Step up preparedness. Fill all equipment fuel tanks and clean the
Hazardous waste area. Campus Safety & Security Department will issue weather
advisories. EOT may be activated at the time or any future Stage.
Stage 2: Hurricane Watch: Hurricane threatens to enter Eastern Seaboard or gulf within
24-36 hours- preliminary storm preparations should begin. All unsecure objects should be
secured and all equipment fuel tanks should be secured. EOC may be mobilized
Stage 3: Hurricane Warning: Hurricane expected to strike specific area within 12-24
hours EOC operational. All precautions should be taken immediately.