Upload
take-on-hate
View
7
Download
0
Embed Size (px)
DESCRIPTION
By the National Network for Arab American Communities
Citation preview
National Network for Arab American Communities
Executive Critical Incident Preparedness Briefing
March 16, 2016
Sanford Altschul
Why Emergency Preparedness Planning?
• Quick and effective action is required during the onset of an emergency.
• Effective action often depends on having plans in place before the disaster strikes.
• If response is delayed, staff, clients, visitors lives maybe needlessly lost.
Emergency Planning• Risks/Hazards• Assessment• Planning• Likely Scenario• Resources
Internal capacity
Risks & Vulnerabilities
External preparedness
Strategic Interventions
Preparedness actions
Risks/Vulnerabilities
Vulnerability The propensity (susceptibility or tendency) of people and things to be damaged by a hazard. A person or group’s vulnerability depends on their capacity to anticipate, cope with, resist and recover from the impact of a hazard.
RiskThe likelihood of a disaster happening to a particular group of people.
Risks/Vulnerabilities
Assessment – What Are Your Risks?
• Severe Weather• Power Outage• Hazardous Materials (Facility, Transportation)• Other Natural Disasters (Earthquake, flooding)• Civil Unrest• Bomb Threats• Violent Intruder
Assessment – Conduct One
• Survey the area• Identify Safe Areas• Identify Evacuation Routes and Assembly
Areas• Look to local resources – Police, Fire,
Emergency Management, DHS• On-Line Tools
Preparedness
Preparedness - Implementation
• Share the plan with employees, stakeholders• Install/Upgrade Security Systems• Develop Policies• Train (Tabletop Exercises, meetings, etc.)• Participate in Community Emergency
Preparedness Activities (Exercises, Seminars, Workshops)
• Link to local Law Enforcement Intelligence Sharing System (e.g. Fusion Center)
The Plan
• Plans take many different formats, has to work for the organization, if not, won’t be used.
• To include:– Assessment (or reference to findings)– Key Resource contact information, including local city
and/or county departments– Key employee and management contact information– Emergency procedures– Some aspects of security procedures (some may be
sensitive/restricted
The Plan (cont.)
• Locations of identified –– Shelter areas– Evacuation routes– Evacuation Assembly Areas– Location of emergency supplies/equipment
• Introduction, Purpose, Objectives, Scope, etc.• Site Maps
Bomb Threat
Bomb Threat5-step process for effectively dealing with bomb threats:
1. Receiving the call and notifying the Control Point.2. Evaluation of the call by the Control Point, and determining which of the following steps is required:
• A search• No search• An evacuation
3. A search of the premises.4. If necessary, evacuation of the premises in an orderly manner.5. All clear.
Violent Intruder/Active Shooter
• We can not predict the origin of the next threat• Assailants in recent incidents across the country
were not students or employees.• Victims are often unaware they were targets, until
attacked **• Very few of the attackers ever directed threats to their
targets before the attack.
Mitigation
• Protective Measures:• Early Warning / Notification System• Surveillance System • Organization training involvement• Building construction• Established escape routes • Identification / location of safe rooms• SEE SOMETHING – SAY SOMETHING
Responding to an Violent Intruder
• RUNRUN• HIDEHIDE
• FIGHTFIGHTCALL 9-1-1CALL 9-1-1
RUN
• Always Be Aware• Know Escape Routes
– Exits/Windows• Move quickly; don’t wait for others to validate
your decision• Leave belongings behind
• Survival chances increase if you are not where shooter is or to go where he can’t see you
HIDE
• If you can’t get out, secure the immediate area “hide out” – whether office, bathroom, storeroom, classroom
• If you find yourself in an open area, immediately seek protection
- Block/barricade the door using whatever is available – desks, file cabinets, books, other furniture
- If the shooter enters your room and leaves, lock/barricade the door behind him
- If safe allow others to seek refuge with you - If two or more of you, DO NOT huddle together
HIDE (cont.)
DOORS, WINDOWS, OPENINGS, and NOISE
- Close blinds - Turn off electronics (TV, radio, etc) - Dim or face computer monitors away from windows or doors - Silence cell phones (put on vibrate) - Place signs in exterior windows to identify the location of injured persons - Keep occupants calm and quiet - After securing the room. People should be positioned out of sight and behind items that might offer additional protection – walls, desks, file cabinets, etc. - Stay low- reduce your profile
FIGHT
• If no other choice!!!
– Attempt to incapacitate and disrupt the intruder
– Act with physical aggression and throw items at the intruder
– Getting shot does not mean that you are dead
•You can and must keep going!
Resources
• Local Emergency Management Office• State Emergency Management Office• Local Inter-Faith Coalition• National Inter-Faith Coalitions
Resources
• Ready.gov• Faith Based Community of Practice,Community.fema.gov• Fema.gov
IS-907 - Active Shooter: What You Can Do http://training.fema.gov/EMIWeb/IS/IS907.asp
IS-906 – Workplace Security Awareness• Dhs.gov/activeshooter
Resources
Questions?
Thank you for attending
About ARK
• ARK-CIM is a recognized leader in Emergency Preparedness, Critical Incident Management, Critical Incident planning and response, Business Continuity Management. With more than 30 years experience assisting organizations in preparing for, responding to and recovering from critical incidents. Clients, including recognized brands throughout North America, recognize us for our commitment to Protect Their Assets: People-Reputation-Products-Community-Infrastructure. Contact us at: (734) 612-7204 or visit us on the web at: ark-cim.com