Emergency Response to Terrorism: Operations A Safe Response for Public Safety Personnel
Emergency Response to Terrorism TC: Emergency Medical Services Unit 3:Security.
-
Upload
stanley-glenn -
Category
Documents
-
view
219 -
download
1
Transcript of Emergency Response to Terrorism TC: Emergency Medical Services Unit 3:Security.
Emergency Response to TerrorismTC: Emergency Medical Services
Unit 3: Security
3-2
Terminal Objective
Given a simulated terrorist event, the student will be able to ID security concerns regarding responses and on-site operation
3-3
Enabling Objectives
ID difference between known and unknown incidents
ID aspects of vulnerability ID primary security actions to take when a
terrorist event occurs ID how topography will impact security ID different strategies and tactics to be
utilized for self-preservation
3-4
Pre-Response Conditions
Different response ifKnown terrorist incidentUnknown terrorist incident
IndicatorsUpdate from dispatch
3-5
Response Criteria
Primary actions involving responders on the scene or en route to the incident
Life protection/preservation Controlling chaos Requesting assistance
3-6
Vulnerability Assessment
Purpose - determine shortfalls and weaknesses when responding to terrorist acts
Assistance of law enforcement necessary for security-related areas
3-7
Vulnerability Assessment:Areas to Consider
Incident site operations Pre-planning response routes (primary and secondary) Command and control sites IED awareness training Secondary explosive devices/booby trap awareness training Multiple-incident site operations considerations
3-8
Vulnerability Assessment:Areas to Consider (cont.)
Pre-planned and proposed staging areas Communications plans (primary and secondary) Medical operations Medical receiving facilities Casualty collection points Mortuary facilities (fixed and temporary) Evacuation sites
3-9
Vulnerability Assessment:Areas to Consider (cont.)
Shelter-in-place considerations Personnel and equipment resources Re-supply resources Security resources Mass casualty response resources (transportation, medical, command and control) Responder knowledge of B-NICE threat outward warning signs
3-10
Vulnerability Assessment:Areas to Consider (cont.)
Evidence preservation training Responder self-protection measures training Rescue operations
3-11
Protective Actions
Hazard A known or perceived danger Chem agent, HazMat, hazardous conditions
Risk Acceptable or unacceptable Exposure to known or perceived danger Gamble whether or not danger will prevail
3-12
Vulnerability
Disadvantage
Exposed position
Threat/Hazard
3-13
Security
Response security: actions to be taken en route
Establishing security-related procedures: Preplan
3-14
Response Security
Response routes & corridors ID primary & alternate response routes ID choke points Designate rallying points
3-15
Preplanning for Survivability
Incident site emergency egress plan Backup team Ruse tactics checklist Methods of alternate or secure
communications Detailed checklist to query involved personnel Gather all info possible on what happened
3-16
Topography
Controls access Bottlenecks Limited access Access & exit
corridors Natural & manmade
characteristics
3-17
Impacts
Are you being drawn into a trap? Are you being forced to advance uphill? Are terrain features forcing you to deviate
from your plan? Are things going according to someone
else’s plan?
3-18
Zones/Perimeter Communications
Concise & clear naming Crosses all boundaries of the country &
agencies Labeling by hazard or protection need
3-19
Perimeter Criteria
Direct zone names & placement
Security Hazardous materials Hazardous conditions Health Biological
3-20
Strategies & Tactics for Self-Protection
Recognition & survival - develop skills to minimize losses
Initial reconnaissance Route Incident site Vulnerability assessment
Overview
3-21
Initial Recon: Route
Determine vulnerable areas Channeling Choke points Ambush
3-22
Initial Recon: Site
Possibility of IEDs Hazards & associated devices Distraction techniques Hoax device tactics Maximize responder survivability
3-23
Initial Recon: Site (cont.)
Ambush tactics Recognition skills: types of devices Rapid evacuation planning issues When device is discovered, what to do?
3-24
Vulnerability Assessment
Where & what are the dangers? Discipline Time to assess ID things that place you at a disadvantage ID exposures & reduce
3-25
Protective Measures
Rig placement Safety of crew Discipline Minimize losses
Risk vs. Benefit Withdrawal policy No acceptable
losses
3-26
Tactical Options
Protection
Reconnaissance
Overview
3-27
Protection Options
Enhance overall responder survivability & supportability
Physically hazardous conditions Proper PPE for the hazard Decon Monitoring Physical shelter Vulnerability assessment Security considerations
3-28
Reconnaissance Options
Recon Team activities Topographical maps Census maps Building plans
3-29
Activity 3.1
Post Office Scenario (Part 1)
3-30
Activity 3.1 (cont.)
3-31
Activity 3.1 (cont.)
3-32
Activity 3.1 (cont.)
3-33
Activity 3.1 (cont.)
3-34
Post Office: Phase 1
1000 hours MONDAY Your agency is dispatched to the local
post office on an EMS call for a female with shortness of breath. The local police department also responds with one police car. While you are responding, your dispatcher notifies you that there are additional calls. Some of the callers are reporting a male victim.
3-35
Post Office: Phase 2
1005 hours MONDAY Upon arrival you see approx. 15 people outside
the main door to the post office coughing, tearing, & calling for help. Several are on their knees. As you put the vehicle in park, 5 people start running toward you calling for help.
The people report that there was a white cloud in the lobby & their eyes & skin started burning.
3-36
Primary actions: life protection, controlling chaos & requesting assistance
ID the hazards, build acceptable risks, analyze vulnerability
Establish procedures before you need them
Summary