Disaster Response Plan (Manmade) PDF

Summary

This document outlines strategies for responding to various man-made disasters, including terrorism. It details different types of attacks and provides procedures for emergency response personnel. The document is likely a guideline for emergency management.

Full Transcript

Disaster Response Plan (Manmade) PURPOSE The purpose of this policy is to provide general guidance to Incident Commanders (IC) for the coordination of emergency operations and resources within the City of Miami to save lives and protect property in the event of a manmade disaster. DEFINITIONS A. Ar...

Disaster Response Plan (Manmade) PURPOSE The purpose of this policy is to provide general guidance to Incident Commanders (IC) for the coordination of emergency operations and resources within the City of Miami to save lives and protect property in the event of a manmade disaster. DEFINITIONS A. Arson: Arson has the advantage of low risk to the perpetrator and requires only a low level of technical knowledge. The potential for use of fire in high-rise during acts of vertical terrorism or an incendiary device released by drone should also be considered. B. Armed Assault / Assassination: a. Armed Assault – Armed assaults can include a wide variety of direct-action activities. Worldwide examples include throwing hand grenades into crowds, rocket attacks on airliners or buildings and the more familiar gun battle or knife attack. b. Assassination – A term applied to the killing of prominent persons and symbolic enemies as well as traitors who defect from a group. One method of creating fear and eliminating rivals is simply by killing them. Assassination targets are selected with a strategic purpose and the actual attack has been planned, coordinated and practiced. C. Active Shooter/ Hostile Event: An incident where one or more individuals are or have been actively engaged in harming, killing, or attempting to kill people in a populated area by means such as firearms, explosives, toxic substances, vehicles, edged weapons, fire or a combination thereof. D. Biological Agent Release: Biological agents consist of organisms or chemicals of biological origin that cause death and disease among humans, animals and plants. Biological agents include Anthrax, Cholera, Plague, Botulism and Ricin among others. Unlike other terrorist weapons, except for some toxins, any physical manifestation of an attack is likely to be delayed. E. Bombing: The improvised explosive device (IED) is the contemporary terrorist weapon of choice. IEDs can be inexpensive to produce and, because of the various detonation October 1, 2020 EOM/Article 1/Section 12 Page |1 Disaster Response Plan (Manmade) techniques available, may be a low risk to the perpetrator. Other advantages include their attention getting capacity and the ability to control casualties through time of detonation and placement of the device. It is also easily deniable should the action produce undesirable results. Other explosive techniques also have become more prevalent, such as vehicle-borne improvised explosive devices (VBIED) and suicide vests. F. Bomb Threat / Hoaxes: Any terrorist group that has established credibility can employ a hoax with considerable success. A threat against a person’s life causes that person and those associated with that individual to devote time and effort to security measures. (A bomb threat can close a commercial building, empty a theater, or delay an aircraft flight at no cost to the terrorist. False alarms dull the analytical and operational efficiency of key security personnel, thus degrading readiness.) G. Chemical Releases: Of the five categories of chemical agents, (nerve, blister, choking, blood and vomiting), nerve gas is undoubtedly the most notorious and dangerous. The nerve gas Sarin was used by the Aum Shinrikyo group in the Tokyo subway system. The terrorist use of a chemical agent in an enclosed environment such as a subway station, auditorium, sports arena or shopping mall has the potential for creating massive numbers of casualties that will quickly overwhelm response capabilities. H. Civil Disturbance: Creating mass, violent disturbances of the public peace in attempts to show the world that the public does support their cause(s). I. Complex Coordinated Terrorist Attack (CCTA): CCTAs are acts of terrorism that involve synchronized and independent team(s) at multiple locations, sequentially or in close succession, initiated with little or no warning, and employing one or more weapon systems: firearms, explosives, fire as a weapon, and other nontraditional attack methodologies that are intended to result in large numbers of casualties. J. Cyber Terrorism: A less violent but increasingly costly tactic is emerging and may be used by terrorists in the future with increasing frequency. As government, business and society in general become increasingly dependent on computers and information technology through the internet, a whole new vulnerability presents itself. Terrorists can use sophisticated hacker skills to enter computer systems remotely to steal, alter or change information contained in databases and operating systems. Cyber terrorists may October 1, 2020 EOM/Article 1/Section 12 Page |2 Disaster Response Plan (Manmade) also attempt to gain control of, or disable, infrastructure components such as dams, utilities or airport radar systems. K. Environmental Destruction: Although this tactic has not been widely asserted, the increasing accessibility of sophisticated weapons and explosives to terrorists has the potential to threaten damage to the environment. Examples are: intentional dumping of hazardous chemicals into a city’s water supply or the destruction of an oil tanker. Fear of alienation may be a factor that has limited the use of this tactic to date. L. Hijacking, Building Seizure, Raids or Attacks on Facilities: a. Hijacking or Skyjacking – Sometimes employed as a means for escape, hijacking is normally carried out to produce a spectacular hostage situation and to gain media attention to the hijackers’ cause. Although trains, buses and ships have been hijacked, aircraft are the preferred target because of their greater mobility and vulnerability. b. Seizure – A seizure usually involves a building or object that has value in the eyes of the audience. There is some risk to the terrorist because security forces have time to react and may opt to use force to resolve the incident, especially if few or no innocent lives are involved. c. Raids or Attacks on Facilities – Armed attacks on facilities are usually undertaken for one of three purposes: to gain access to radio or television broadcast capabilities to make a statement; to demonstrate the government’s inability to secure critical facilities or national symbols; or for logistical purposes; e.g., robbery of a bank or armory. M. Hostage Taking: This usually is an overt seizure of one or more individuals with the intent of gaining publicity or other concessions in return for release of the hostage. While dramatic, hostage and hostage barricade situations are risky for the perpetrator when executed in an unfriendly environment. Generally, hostage taking is a well-planned operation that involves considerable surveillance, reconnaissance and planning prior to the attack, but it can also be an impromptu situation when some other activity goes bad. N. Kidnapping: Kidnapping involves the seizure of prominent people. While like hostage taking, kidnapping has significant differences. Kidnapping is usually a covert seizure of October 1, 2020 EOM/Article 1/Section 12 Page |3 Disaster Response Plan (Manmade) one or more specific persons until specific demands are met. The perpetrators of the action may not be known for a long time. News media is initially intense but decreases over time. Because of the time involved, successful kidnapping involves elaborate planning and logistics. The risk to the terrorist is less than a hostage situation. Kidnapping for ransom is becoming a favored method for financing terrorist operations in parts of the world. O. Nuclear Release Weapons: The nuclear terrorist threat consists of Improvised Nuclear Devices (IND) capable of creating a nuclear yield and Radiological Dispersion Devices (RDD). INDs include either nuclear weapons stolen or obtained from a nuclear powers inventory or an improvised device designed and constructed by the terrorists. RDDs involve the inclusion of radioactive material with a conventional explosive device; when the conventional explosive is detonated it contaminates a wide area with the radioactive material. P. Product Tampering / Sabotage: The objective in most sabotage incidents is to demonstrate how vulnerable society is to terrorist actions. Industrialized societies are more vulnerable to sabotage than less highly developed societies. Utilities, communications, and transportation systems are so interdependent that a serious disruption of any one affects all of them and gains immediate public attention. Sabotage of industrial or commercial facilities is one means of identifying the target while making a statement of future intent. Sabotage involves an assortment of methods that can include such diverse techniques ranging from product tampering to spiking trees to discourage their being harvested. The rationale for this tactic can range from extortion to destroying public faith in a product or service. Q. Robbery / Attempted Robber: Robbery is used to obtain funds to support the terrorist’s cause and logistical needs. R. Vehicle Ramming Attack: A form of mass murder in which a perpetrator deliberately rams a motor vehicle into a building, crowd of people, or another vehicle. October 1, 2020 EOM/Article 1/Section 12 Page |4 Disaster Response Plan (Manmade) GENERAL INFORMATION The intent of this guideline is to provide direction to ICs and emergency responders who will develop the initial operational structure in response to manmade disasters that is consistent with the National Response Framework. City of Miami Fire-Rescue (MFR) will utilize the National Incident Management System (NIMS) and its Incident Command System (ICS) as the organizational structure for response to terrorist incidents. NIMS guides all levels of government, non-governmental organizations (NGO), and the private sector to work together to prevent, protect against, mitigate, respond to, and recover from incidents. NIMS provides stakeholders across the whole community with the shared vocabulary, systems, and processes to successfully deliver the capabilities described in the National Preparedness System. NIMS defines operational systems, including the Incident Command System (ICS), Emergency Operations Center (EOC) structures, and Multiagency Coordination Groups (MAC Groups) that guide how personnel work together during incidents. NIMS applies to all incidents, from traffic accidents to major disasters. (National Response Framework) Acts of terrorism challenges the ICS due to its catastrophic nature and potential number of local, State, and Federal agencies involved in the incident response. In the aftermath of the 2001 terrorist attacks, the need for an integrated nationwide incident management system with standard structures, terminology, processes, and resources became clear. ICS incorporates the concept of Unified Command when more than one Department or agency is responsible for an emergency event. The jurisdictions and organizations involved in managing incidents vary in their authorities, management structures, communication capabilities and protocols, and many other factors. NIMS provides a common framework to integrate these diverse capabilities and achieve common goals. A Unified Command will be essential to the efficient and effective use of multiple agency resources responding to the terrorist incident. The central concept of Unity of Command is that each person within a responding organization reports to only one person. Unified Command allows all agencies with responsibility for terrorist incident response, whether geographically or functionally aligned, to manage an incident by establishing a common set of objectives and strategies. October 1, 2020 EOM/Article 1/Section 12 Page |5 Disaster Response Plan (Manmade) Responding organizations maintain their agency authority, responsibility, and accountability under Unified Command. However, under Unified Command, responding agencies contribute to the command process by determining the overall objectives, planning and conducting jointintegrated operations, and maximizing the utilization of assigned resources. Unified Command is critical to terrorist incident response because it is the only mechanism that provides a single, coordinated Incident Action Plan (IAP) for incident functions, a single focal point for implementing the IAP, and a single Incident Command Post (ICP) or facility. 1. Typical of large metropolitan cities, the City of Miami is subject to manmade disasters. 2. The City of Miami is subject to acts of terrorism. Terrorist attacks may or may not be preceded by a warning or a threat and may at first appear to be an ordinary incident. 3. Terrorists may strike at multiple locations and simultaneously, at any time of day or night while using a wide variety of weapons and tactics. PROCEDURE The IC shall establish a Unified Command with the Miami Police Department (MPD) when incidents involving a manmade disaster have been identified. The IC will also consider the following: • Develop fire suppression strategies and provide emergency medical services (EMS) while in coordination with MPD in a unified command structure. • Consider additional resources as outlined in the following referenced guidelines: o EOM – Article 2:03 - Communications and Notification - Dispatch and Notification Procedures for Major Emergencies Dispatch and Notification Procedures for Major Emergencies o EOM – Article 3:58 – Incident Procedures - Active Shooter/Hostile Event Response (ASHER) Active Shooter Hostile Event Response - ASHER o Mass Casualty Incidents -Common EMS Protocols – Procedures Section / Chapter 24 Common Protocols - Miami 18-20 version 1.7 October 1, 2020 EOM/Article 1/Section 12 Page |6 Disaster Response Plan (Manmade) • Request assistance from Fire-Rescue Special Operations such as HazMat (HM), Technical Rescue Team (TRT), SWAT medics, USAR and/or waterborne resources. • When appropriate, coordinate with MPD to implement a Rescue Task Force (RTF) response. The IC shall maintain oversight of the safety and security of his/her personnel. • Consider developing a Joint Hazard Awareness Team (JHAT) to deployed at areas of mass gatherings along as well as target hazards. • Initiate a system for patient tracking and hospital surge capacity. • Assure that MFR units are conducting operations while remaining cognizant of crime scene preservation. Notifications There are two unique actions that all ICs should consider early in a manmade disaster response. 1) Identifying if the event is a known, suspected or threatened terrorist attack. 2) If so, assuring that the proper notifications outlined in this guideline are promptly made. The following notifications shall be made through the Fire Central Information Officer (FCIO) at the direction of the IC: • Staff Duty Officer (SDO) • Fire Chief and executive staff • County Warning Point • Public Information Officer • Public Works • American Red Cross • Miami-Dade Transit Authority (MDTA) • Area Hospitals FCIO will provide the location of the unified command post to agencies notified and will request the response of a representative with the authority to offer the appropriate assistance. October 1, 2020 EOM/Article 1/Section 12 Page |7 Disaster Response Plan (Manmade) Emergency Operations Center Once an incident has occurred, the nature and magnitude of the incident will determine the degree of the City of Miami response and the amount of County, Region, State, and Federal assistance required The Fire Chief, or designee, may elect to make the recommendation to the City Manager to activate and manage the City of Miami EOC. The EOC will also assume responsibility of alerting City of Miami departments, outside agencies, and the public of the situation. Representatives of the EOC will liaison and assist with coordinating resources and information from Miami-Dade County, the Regional Domestic Security Task Force (RDSTF), State, Federal, and private organizations. The list below represents examples of resources available, coordinated through the EOC: • Miami-Dade County Health Department • Miami-Dade County Medical Examiner’s Office • State Warning Point • Florida Department of Law Enforcement • Florida Division of Emergency Management • State Emergency Response Team (SERT) • Department of Homeland Security • Federal Bureau of Investigation • Federal Emergency Management Agency (FEMA) • Department of Defense • Department of Energy • Environmental Protection Agency • Federal Aviation Administration October 1, 2020 EOM/Article 1/Section 12 Page |8 Disaster Response Plan (Manmade) Joint Information Center (JIC) In concert with representatives from the MPD public information office, the MFR Public Information Officer (PIO) will establish and maintain a Joint Information Center (JIC). The JIC will obtain information about the incident from the Unified Command structure, EOC, and other sources as deemed appropriate. Once the message has been cleared by the IC, the JIC will coordinate all agency PIO efforts in the release of information. The JIC will assume the responsibility of managing media logistics. Complex Coordinated Terrorist Attack (CCTA) and Expanding Incidents Personnel involved from the Emergency Response Division (ERD) along with the Communications Division (CD) shall remain aware of the potential of multiple simultaneous attacks as experienced in a Complex Coordinated Terrorists Attack (CCTA) as well as incidents that may expand from the initial incident which may require multiple operational periods. October 1, 2020 EOM/Article 1/Section 12 Page |9 Disaster Response Plan (Manmade) Incident(s) Occurs ON-SCENE Miami Police Department Response Fire-Rescue Response Establish Unified Command Establish JIC Notifications City EOC Activated County, State, Federal Response October 1, 2020 EOM/Article 1/Section 12 P a g e | 10

Use Quizgecko on...
Browser
Browser