SlideShare a Scribd company logo
1 of 50
Quarterly Security Meeting:
     Shelter in Place




        www.cateyes.us
         Copyright © 2001-2007
            Copyright © 2013
Quarterly Security Meeting

• Exercise
• Security topic
• Update on latest threats to
  post to Terrorism Awareness Board
• Security trends or problems within the company
• Exercise Plans and After Action Reports


                      Copyright © 2013
Quarterly Security Meeting

• Exercise
• Security topic
• Update on latest threats to
  post to Terrorism Awareness Board
• Security trends or problems within the company
• Exercise Plans and After Action Reports


                      Copyright © 2013
Exercise: Shelter in Place




           Copyright © 2013
Exercise: Shelter in Place




           Copyright © 2013
Security Plan: Table of Contents




              Copyright © 2013
What “Shelter in Place” Means

• Precaution to keep you safe while remaining
  indoors
• Select a small, interior room with no or few
  windows
• Protection from hazardous materials
  released into the atmosphere
• Temporary measure, usually 3 to 4 hours


                      Copyright © 2013
How to Shelter in Place

• Close the business
• Bring everyone into the room(s)
• Shut and lock the doors
• Ask customers, clients, visitors to stay,
  not leave the building
• Call emergency contacts to let them
  know you are safe


                     Copyright © 2013
How to Shelter in Place

• Call forwarding
• Change business phone announcement
  to say the business is closed
• Close and lock exterior openings
• Turn off HVAC system and anything that
  exchanges with outside air and water



                    Copyright © 2013
How to Shelter in Place

• Avoid overcrowding – select multiple
  rooms if necessary
• Ideal to have a hard-wired telephone in
  the room(s)
• Evacuation Kit and disaster supplies
• Consider the maintenance pits in the
  garage for radiological shielding or
  tornadoes

                   Copyright © 2013
Evacuation Kits (SEP, page 17)
•   Copy of SEP
•   Reference Guides
•   Emergency Phone Numbers (cellular phones, staff call out no.)
•   Current Daily Operations/Assignments
•   Status Report Forms
•   Copy of Site Floor Plan
•   Notepad / MAP/ ATLAS
•   Pens , Pencils , and Markers
•   Flashlight / with extra batteries
•   Portable AM/FM or Scanner Radio
•   Wall/Car Charger for Cell Phone/Portable Radios
•   Camera (Cell/Disposable)
•   Lap Top Computer / Disk / Thumb Drives / Cell Phone Internet Adaptor
•   AC/DC Converter

                                 Copyright © 2013
Critical Supplies

• Bottled water
• Flashlight(s)
• Radio (battery-operated)
• First Aid supplies
• Duct tape and plastic sheeting
• Plastic garbage bags



                       Copyright © 2013
Exercise: Shelter in Place

• Document “Lessons Learned”
  – Examples
     • No Evac Kit or missing items
     • No radio or TV on facility
     • Update the SEP with some of these new ideas
     • Only 1 person knows how to shut off HVAC

• Write up, post in Appendix J of SEP


                         Copyright © 2013
Quarterly Security Meeting

• Exercise
• Security topic
• Update on latest threats to
  post to Terrorism Awareness Board
• Security trends or problems within the company
• Exercise Plans and After Action Reports


                      Copyright © 2013
Bus Industry
Peer Advisory Group
  Staying Ahead of the Curve




  Peer Advisory Group (PAG)
Surface Transportation Security
National Mass Transit, Passenger Rail, & OTRB Security
                       Strategy
Risk-Based Security Strategy

 • Aligned with TSA Principles of Risk-Based Security across all modes
   of Surface Transportation
    • Focuses resources at higher relative risk locations and assets
    • Completely responsive to risk

 • Intelligence driven Implementation of Risk Reduction Programs
    • Levels of unpredictable operational deterrence and response measures
      driven by intelligence-based threat scenarios and levels

 • Measures include:
    •   Unpredictable operational deterrence
    •   Preparedness and response exercises
    •   Improve critical infrastructure resilience
    •   Front employee training
    •   Public Awareness “If you see something, say something”
                                                                             17
Achieving Desired Outcomes
                                                                                                     The privacy and civil
Strategic      Overall casualties
                                            The general public             People and goods        liberties of individuals
                                             perceives surface             move freely within      and entities that own,
Outcomes     from terrorist attacks
                                           transportation to be          surface transportation        operate or use
                  are limited
                                              safe and secure                    modes                 transportation
                                                                                                   systems are protected




Approaches
                              DETERRENCE




                                                                  DETECTION




                                                                                                  RESILIENCE
(to meet these
outcomes)




                                                        Respond to all
Proxy               Create a minimum
                                                       emergency related
                                                                                          Limit disruption and
                      25% perceived                                                         restore normal or
Measures of            likelihood of
                                                     events within 10 min,
                                                                                         alternative operations
                                                     non-emergency within
                                                                                             within 12 hours
Effectiveness           interdiction                        20 min                                                    18
Objective: Effective Deterrence
Target: Create a minimum 25% perceived likelihood of
interdiction at high risk locations and critical assets
       Achieving this standard requires                               LIKELIHOOD OF INTERDICTION

           presence and credibility                                 100%
 • Presence of visible security measures
  — Security and Canine Patrols are randomly present at high
    risk locations and critical assets in system for at least 25%
    of operating hours (120 minutes/8 hours).                                        Standard
  — CCTV Cameras cover of 100% of the high risk locations                            threshold if
    and critical assets in system.                                                   interdiction
                                                                                     results in

 • Credibility of security measures                                 25%
                                                                                     detain and
                                                                                     arrest

  — For the purposes of this analysis, credibility of security
    measures—the likelihood that a given security measure
                                                                                     Minimum
    would achieve its objective—was assumed to be 100%               2%              threshold if
    (anything less would require more presence)                                      interdiction
                                                                                     results in detain
                                                                                     and arrest
                                                                     0%
                                                                                            19
Objective: Effective Detection & Response
 Target: Respond to all emergency related events within 10 min,
                 non-emergency within 20 min
                                                                          SECURITY PERSONNEL
 Resolution involves having the ability to                                   RESPONSE TIME

detect a threat and respond appropriately                                            Respond to at
                                                                                     least 80% of
 • Detect 100% of suspicious activity that matters                                   immediate
                                                                                     incidents in 20
   — The travelling public, frontline employees, and security      20 min.           mins. (British
                                                                                      ,
                                                                                     Transport
     personnel are sufficiently informed and motivated to                            Police
     detect suspicious activity and make relevant and timely                         standard)⁴
     reports.                                                                       Mid-range
                                                                                    average
 • Ability to respond appropriately within 10                      10               response time
                                                                   min.
   minutes to identified suspicious activity                                        Average
                                                                                    Emergency
                                                                                    Response Time
   — Within 20 minutes, reporting of suspicious activity must be   5 min.           Goal (BART)⁵
     communicated, analyzed, and, as appropriate, security
                                                                                    Emergency
     personnel dispatched and arrive on scene.                     3 min.           response time
                                                                                    to Oklahoma
                                                                   0 min.
                                                                                    City bombing⁶
                                                                                             20
Objective: Effective Resilience
Target: Limit service disruption and restore to 90%
normal or alternative operations within 12 hours
Achieving this standard requires limited direct                       SYSTEM RESTORATION TIME
    consequences, robust transportation
                                                                                   Re-opening of
 alternatives, and 12 hour restoration time.                                       affected track
                                                                                   after June 2009
                                                                                   WMATA Red
• Limited direct consequences of incidents                         5 days          Line crash⁸

    — Infrastructure hardening and incident response activities                    Mid-range
                                                                                   average system
      limit immediate casualties and damage to infrastructure.                     restoration
                                                                    12             time
• Robust transport alternatives to reroute flows                   hours           Restoration
    — System redundancy and individual resilience efforts                          after 1995
                                                                   6 hours         Paris metro
      create alternative transportation routes & alternatives to                   attack⁹
      transportation.                                                              Conclude
                                                                                   police activity
 • 12 hours to restoration of full system service                                  which disrupts
                                                                   1.5             train service
     — Recovery capabilities ensure timely restoration of          hours           (British Trans.
       system to full operating status.                                            Police
                                                                   0 hours         standard)¹⁰
                                                                                           21
QUESTIONS?
              Doyle Raines                             Ron Masciana
              Division Director                        Technical Counselor
              Surface Division                         Surface Division
              Office of Security Policy                Office of Security Policy and
              and Industry Engagement                  Industry Engagement
              571-227-3982                             571-227-5672

              Christopher T. McKay                     Fred Goodine
              Branch Manager                           Section Chief
              Mass Transit and Passenger Rail          Mass Transit and Passenger Rail
              Surface Division                         Surface Division
              Office of Security Policy and            Office of Security Policy and Industry
              Industry Engagement                      Engagement
              571-227-2160                             571-227-1725


  This Strategy was developed in coordination with the Mass Transit Sector Coordinating Council
  (Transit Security Peer Advisory Group) Chief Paul McMillan, Massachusetts Bay Transit Authority,
  Chairman.
                                                                                                22
Peer
               BISC Project Updates                              Advisory
                                                                 Group


• Cyber Security
• Human Trafficking
• Active Shooter Protocols in a Moving or Stationary
  Bus




9 April 2013            Bus Industry Peer Advisory Group (PAG)        23
Peer
 Collaborative Projects Going Forward                                               Advisory
                                                                                    Group

• Convert “Mass Transit Security Strategy” to
  Motorcoaches
• OTRB TRIAD Reports

                                                             Motorcoach Transportation
                                                                 Security Strategy




9 April 2013        Bus Industry Peer Advisory Group (PAG)                               24
Bus Industry Safety Council
            (BISC)
• Consider attending and joining one of the
  committees
• Reimbursed $500 and 4 meals paid
• June 11 and 12 in Herndon, VA
• For more information, email Matt Cahill
  mcahill@buses.org


                   Copyright © 2013
Complete details at www.buses.org




Copyright © 2013
Quarterly Security Meeting

• Exercise
• Security topic
• Update on latest threats to
  post to Terrorism Awareness Board
• Security trends or problems within the company
• Exercise Plans and After Action Reports


                      Copyright © 2013
See poster – next slide


       After discussion, the
     document will be posted
         on the Terrorism
        Awareness Board


                 Copyright © 2013
Quarterly Security Meeting

• Exercise
• Security topic
• Update on latest threats to
  post to Terrorism Awareness Board
• Security trends or problems within the company
• Exercise Plans and After Action Reports


                      Copyright © 2013
General Discussion or
   Security Topic




         Copyright © 2013
2 Simulated Explosives Found
        in NY and CA
Bus Industry Peer Advisory
9 April 2013                                33
                      Group (PAG)
Bus Industry Peer Advisory
9 April 2013                                34
                      Group (PAG)
Bus Industry Peer Advisory
9 April 2013                                35
                      Group (PAG)
Bus Industry Peer Advisory
9 April 2013                                36
                      Group (PAG)
Bus Industry Peer Advisory
9 April 2013                                37
                      Group (PAG)
$189,000,000

• Discretionary Funds from Congress to TSA
• Recommend you write your congressmen
  and tell them you would like an Intercity
  Bus Grant with some of those funds




                   Copyright © 2013
Contact Your Congressmen




          Copyright © 2013
Contact Your Congressmen




          Copyright © 2013
Contact Your Congressmen




          Copyright © 2013
Contact Your Congressmen




          Copyright © 2013
“I h e a r d
TSA
r e c e i v e d
$189 m i l l i o n
i n
d i s c r e t i o
n a r y f u n d s .
Pl e a s e
c o n t a c t
t h e TSA
A d mi n i s t r
a t o r a n d
l e t h i m
k n o w we
c a n u s e
t h i s f o r
Quarterly Security Meeting

• Exercise
• Security topic
• Update on latest threats to
  post to Terrorism Awareness Board
• Security trends or problems within the company
• Exercise Plans and After Action Reports


                      Copyright © 2013
Document This Training
• Write a report describing today’s training or
  wait to receive the Minutes from CAT Eyes
• NOTE: examples can be found in Appendix J of
  your SEP
• Post your report in
  Appendix J




                        Copyright © 2013
Next Quarterly Security Meeting
will be held in July 9, 17 and 26.
 You will receive an invitation.
                                    Bomb Threat and
                                   Building Evacuation




   Copyright © 2001-
   2007                Copyright © 2013
Copyright © 2013
Documentation

• To receive Minutes and other
  documentation from today’s meeting:
  – Go to www.dropbox.com
  – Sign in: CEQSM@hotmail.com
  – Password: bus1234
  – Open the file labeled “Documents to
    Accompany QSM (Q2 - Shelter)”

                    Copyright © 2013
Documentation

• Posters should be displayed on your
  Terrorism Awareness Board
• Post the Minutes in Appendix J of your
  SEP
• The meeting was also recorded
  – “Quarterly Security Meeting (Q2 - Shelter) –
    narrated” in the same dropbox account

                     Copyright © 2013
Conclusion

• This concludes today’s meeting
• Direct any questions to frankm@cateyes.us




                   Copyright © 2013

More Related Content

What's hot

Cyber Security C2
Cyber Security C2Cyber Security C2
Cyber Security C2lamcindoe
 
D team weekly powerpoint presentation spqm
D team weekly powerpoint presentation spqmD team weekly powerpoint presentation spqm
D team weekly powerpoint presentation spqmMiraj Mhaisuria
 
20[1].03.Simplified Security
20[1].03.Simplified Security20[1].03.Simplified Security
20[1].03.Simplified Securityravichar
 
Unified emergency management paper
Unified emergency management paperUnified emergency management paper
Unified emergency management paperFPC Risk
 
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Anup Narayanan
 
A model for reducing information security risks due to human error
A model for reducing information security risks due to human errorA model for reducing information security risks due to human error
A model for reducing information security risks due to human errorAnup Narayanan
 
Media Object File Flt Ops Hum Per Seq06
Media Object File Flt Ops Hum Per Seq06Media Object File Flt Ops Hum Per Seq06
Media Object File Flt Ops Hum Per Seq06syed viquar
 
A key to business resilience
A key to business resilienceA key to business resilience
A key to business resilienceCPA Australia
 
Risk Management Basics for Globalization Projects
Risk Management Basics for Globalization ProjectsRisk Management Basics for Globalization Projects
Risk Management Basics for Globalization Projectsvanessa_wilburn
 
Microsoft Power Point Simon Final
Microsoft Power Point   Simon FinalMicrosoft Power Point   Simon Final
Microsoft Power Point Simon Finalguesta09d518
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccessasundaram1
 

What's hot (19)

Cyber Security C2
Cyber Security C2Cyber Security C2
Cyber Security C2
 
D team weekly powerpoint presentation spqm
D team weekly powerpoint presentation spqmD team weekly powerpoint presentation spqm
D team weekly powerpoint presentation spqm
 
20[1].03.Simplified Security
20[1].03.Simplified Security20[1].03.Simplified Security
20[1].03.Simplified Security
 
Unified emergency management paper
Unified emergency management paperUnified emergency management paper
Unified emergency management paper
 
Critical thinking
Critical thinkingCritical thinking
Critical thinking
 
Project Management - Introduction
Project Management - IntroductionProject Management - Introduction
Project Management - Introduction
 
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
 
A model for reducing information security risks due to human error
A model for reducing information security risks due to human errorA model for reducing information security risks due to human error
A model for reducing information security risks due to human error
 
Warning Development Process Article
Warning Development Process ArticleWarning Development Process Article
Warning Development Process Article
 
Case Study Kaiser
Case Study KaiserCase Study Kaiser
Case Study Kaiser
 
Media Object File Flt Ops Hum Per Seq06
Media Object File Flt Ops Hum Per Seq06Media Object File Flt Ops Hum Per Seq06
Media Object File Flt Ops Hum Per Seq06
 
A key to business resilience
A key to business resilienceA key to business resilience
A key to business resilience
 
Risk Management Basics for Globalization Projects
Risk Management Basics for Globalization ProjectsRisk Management Basics for Globalization Projects
Risk Management Basics for Globalization Projects
 
Wagster
WagsterWagster
Wagster
 
Microsoft Power Point Simon Final
Microsoft Power Point   Simon FinalMicrosoft Power Point   Simon Final
Microsoft Power Point Simon Final
 
2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess2006 issa journal-organizingand-managingforsuccess
2006 issa journal-organizingand-managingforsuccess
 
Emergency Planning Safety
Emergency Planning SafetyEmergency Planning Safety
Emergency Planning Safety
 
Retail Loss Prevention Summit V1.0
Retail Loss Prevention Summit V1.0Retail Loss Prevention Summit V1.0
Retail Loss Prevention Summit V1.0
 
Stream 2 - Don't Risk IT
Stream 2 - Don't Risk ITStream 2 - Don't Risk IT
Stream 2 - Don't Risk IT
 

Viewers also liked

Bases concurso TeleElx - Terra Natura
Bases concurso TeleElx - Terra NaturaBases concurso TeleElx - Terra Natura
Bases concurso TeleElx - Terra NaturaSalvador Campello
 
painmanagementbestpractice
painmanagementbestpracticepainmanagementbestpractice
painmanagementbestpracticeJane Shannon
 
Concurso de Creatividad Audiovisual TeleElx
Concurso de Creatividad Audiovisual TeleElxConcurso de Creatividad Audiovisual TeleElx
Concurso de Creatividad Audiovisual TeleElxSalvador Campello
 
Dossier tarifas 2016-2017 TeleElx
Dossier tarifas 2016-2017 TeleElx Dossier tarifas 2016-2017 TeleElx
Dossier tarifas 2016-2017 TeleElx Salvador Campello
 
5. Curso De Investigacion. DiseñOs 2
5. Curso De Investigacion. DiseñOs 25. Curso De Investigacion. DiseñOs 2
5. Curso De Investigacion. DiseñOs 2antonioenfer
 
Impacto ambiental en carreteras
Impacto ambiental en carreterasImpacto ambiental en carreteras
Impacto ambiental en carreterastame11
 
Tratamientos futiles
Tratamientos futilesTratamientos futiles
Tratamientos futilesMalena Rey
 
Eie 3 el mercado 2016
Eie 3 el mercado  2016Eie 3 el mercado  2016
Eie 3 el mercado 2016jossansan1
 
Fol 6 el contrato de trabajo 2016
Fol 6 el contrato de trabajo 2016Fol 6 el contrato de trabajo 2016
Fol 6 el contrato de trabajo 2016jossansan1
 
Kafkaを活用するためのストリーム処理の基本
Kafkaを活用するためのストリーム処理の基本Kafkaを活用するためのストリーム処理の基本
Kafkaを活用するためのストリーム処理の基本Sotaro Kimura
 

Viewers also liked (15)

Bases concurso TeleElx - Terra Natura
Bases concurso TeleElx - Terra NaturaBases concurso TeleElx - Terra Natura
Bases concurso TeleElx - Terra Natura
 
Proref
ProrefProref
Proref
 
daniloxxx
daniloxxxdaniloxxx
daniloxxx
 
painmanagementbestpractice
painmanagementbestpracticepainmanagementbestpractice
painmanagementbestpractice
 
Concurso de Creatividad Audiovisual TeleElx
Concurso de Creatividad Audiovisual TeleElxConcurso de Creatividad Audiovisual TeleElx
Concurso de Creatividad Audiovisual TeleElx
 
Dossier tarifas 2016-2017 TeleElx
Dossier tarifas 2016-2017 TeleElx Dossier tarifas 2016-2017 TeleElx
Dossier tarifas 2016-2017 TeleElx
 
5. Curso De Investigacion. DiseñOs 2
5. Curso De Investigacion. DiseñOs 25. Curso De Investigacion. DiseñOs 2
5. Curso De Investigacion. DiseñOs 2
 
Publisher
PublisherPublisher
Publisher
 
Impacto ambiental en carreteras
Impacto ambiental en carreterasImpacto ambiental en carreteras
Impacto ambiental en carreteras
 
Wendy's updated resume
Wendy's updated resumeWendy's updated resume
Wendy's updated resume
 
Tratamientos futiles
Tratamientos futilesTratamientos futiles
Tratamientos futiles
 
Foam roll
Foam rollFoam roll
Foam roll
 
Eie 3 el mercado 2016
Eie 3 el mercado  2016Eie 3 el mercado  2016
Eie 3 el mercado 2016
 
Fol 6 el contrato de trabajo 2016
Fol 6 el contrato de trabajo 2016Fol 6 el contrato de trabajo 2016
Fol 6 el contrato de trabajo 2016
 
Kafkaを活用するためのストリーム処理の基本
Kafkaを活用するためのストリーム処理の基本Kafkaを活用するためのストリーム処理の基本
Kafkaを活用するためのストリーム処理の基本
 

Similar to Quarterly Security Meeting: Shelter in Place Exercise

111021 3 Security Masterplanning Issues For Built Environments
111021 3 Security Masterplanning Issues For Built Environments111021 3 Security Masterplanning Issues For Built Environments
111021 3 Security Masterplanning Issues For Built Environmentszadok001
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoonNASAPMC
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryUKTI2014
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitygangal
 
Reactive To Predictive 1,2
Reactive To Predictive 1,2Reactive To Predictive 1,2
Reactive To Predictive 1,2Ydalus
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtableJunSeok Seo
 
Cevnvibertpresentation1
Cevnvibertpresentation1Cevnvibertpresentation1
Cevnvibertpresentation1cevn
 
Cevnvibertpresentation1
Cevnvibertpresentation1Cevnvibertpresentation1
Cevnvibertpresentation1cevn
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical FacilitiesSE_NAM_Training
 
HSE-BMS-004 Supervisors Training.ppt
HSE-BMS-004 Supervisors Training.pptHSE-BMS-004 Supervisors Training.ppt
HSE-BMS-004 Supervisors Training.pptGkMechanical
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Wydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphyWydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphyraymurphy9533
 
Accenture Life Safety Solution
Accenture Life Safety SolutionAccenture Life Safety Solution
Accenture Life Safety SolutionTony Smith
 
Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Margolis Healy
 
DARWIN Webinar 'The sharp end' by Anders Ellerstrand
DARWIN Webinar 'The sharp end' by Anders EllerstrandDARWIN Webinar 'The sharp end' by Anders Ellerstrand
DARWIN Webinar 'The sharp end' by Anders EllerstrandPeter O'Leary
 
The TTPs of hard hat incident response
The TTPs of hard hat incident responseThe TTPs of hard hat incident response
The TTPs of hard hat incident responseHinne Hettema
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013Ian Sommerville
 
Security and Business Continuity Working Together
Security and Business Continuity Working TogetherSecurity and Business Continuity Working Together
Security and Business Continuity Working Togethercharliemb2
 
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityAdlan Hussain
 

Similar to Quarterly Security Meeting: Shelter in Place Exercise (20)

111021 3 Security Masterplanning Issues For Built Environments
111021 3 Security Masterplanning Issues For Built Environments111021 3 Security Masterplanning Issues For Built Environments
111021 3 Security Masterplanning Issues For Built Environments
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoon
 
Cevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th JanuaryCevn Vibert. Thales UK. 28th January
Cevn Vibert. Thales UK. 28th January
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Reactive To Predictive 1,2
Reactive To Predictive 1,2Reactive To Predictive 1,2
Reactive To Predictive 1,2
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtable
 
SECURITY UPDATE.pptx
SECURITY UPDATE.pptxSECURITY UPDATE.pptx
SECURITY UPDATE.pptx
 
Cevnvibertpresentation1
Cevnvibertpresentation1Cevnvibertpresentation1
Cevnvibertpresentation1
 
Cevnvibertpresentation1
Cevnvibertpresentation1Cevnvibertpresentation1
Cevnvibertpresentation1
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical Facilities
 
HSE-BMS-004 Supervisors Training.ppt
HSE-BMS-004 Supervisors Training.pptHSE-BMS-004 Supervisors Training.ppt
HSE-BMS-004 Supervisors Training.ppt
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Wydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphyWydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphy
 
Accenture Life Safety Solution
Accenture Life Safety SolutionAccenture Life Safety Solution
Accenture Life Safety Solution
 
Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...
 
DARWIN Webinar 'The sharp end' by Anders Ellerstrand
DARWIN Webinar 'The sharp end' by Anders EllerstrandDARWIN Webinar 'The sharp end' by Anders Ellerstrand
DARWIN Webinar 'The sharp end' by Anders Ellerstrand
 
The TTPs of hard hat incident response
The TTPs of hard hat incident responseThe TTPs of hard hat incident response
The TTPs of hard hat incident response
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
 
Security and Business Continuity Working Together
Security and Business Continuity Working TogetherSecurity and Business Continuity Working Together
Security and Business Continuity Working Together
 
IPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port SecurityIPSecurityCenterTM PSIM Enhancing Port Security
IPSecurityCenterTM PSIM Enhancing Port Security
 

Recently uploaded

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 

Quarterly Security Meeting: Shelter in Place Exercise

  • 1. Quarterly Security Meeting: Shelter in Place www.cateyes.us Copyright © 2001-2007 Copyright © 2013
  • 2. Quarterly Security Meeting • Exercise • Security topic • Update on latest threats to post to Terrorism Awareness Board • Security trends or problems within the company • Exercise Plans and After Action Reports Copyright © 2013
  • 3. Quarterly Security Meeting • Exercise • Security topic • Update on latest threats to post to Terrorism Awareness Board • Security trends or problems within the company • Exercise Plans and After Action Reports Copyright © 2013
  • 4. Exercise: Shelter in Place Copyright © 2013
  • 5. Exercise: Shelter in Place Copyright © 2013
  • 6. Security Plan: Table of Contents Copyright © 2013
  • 7. What “Shelter in Place” Means • Precaution to keep you safe while remaining indoors • Select a small, interior room with no or few windows • Protection from hazardous materials released into the atmosphere • Temporary measure, usually 3 to 4 hours Copyright © 2013
  • 8. How to Shelter in Place • Close the business • Bring everyone into the room(s) • Shut and lock the doors • Ask customers, clients, visitors to stay, not leave the building • Call emergency contacts to let them know you are safe Copyright © 2013
  • 9. How to Shelter in Place • Call forwarding • Change business phone announcement to say the business is closed • Close and lock exterior openings • Turn off HVAC system and anything that exchanges with outside air and water Copyright © 2013
  • 10. How to Shelter in Place • Avoid overcrowding – select multiple rooms if necessary • Ideal to have a hard-wired telephone in the room(s) • Evacuation Kit and disaster supplies • Consider the maintenance pits in the garage for radiological shielding or tornadoes Copyright © 2013
  • 11. Evacuation Kits (SEP, page 17) • Copy of SEP • Reference Guides • Emergency Phone Numbers (cellular phones, staff call out no.) • Current Daily Operations/Assignments • Status Report Forms • Copy of Site Floor Plan • Notepad / MAP/ ATLAS • Pens , Pencils , and Markers • Flashlight / with extra batteries • Portable AM/FM or Scanner Radio • Wall/Car Charger for Cell Phone/Portable Radios • Camera (Cell/Disposable) • Lap Top Computer / Disk / Thumb Drives / Cell Phone Internet Adaptor • AC/DC Converter Copyright © 2013
  • 12. Critical Supplies • Bottled water • Flashlight(s) • Radio (battery-operated) • First Aid supplies • Duct tape and plastic sheeting • Plastic garbage bags Copyright © 2013
  • 13. Exercise: Shelter in Place • Document “Lessons Learned” – Examples • No Evac Kit or missing items • No radio or TV on facility • Update the SEP with some of these new ideas • Only 1 person knows how to shut off HVAC • Write up, post in Appendix J of SEP Copyright © 2013
  • 14. Quarterly Security Meeting • Exercise • Security topic • Update on latest threats to post to Terrorism Awareness Board • Security trends or problems within the company • Exercise Plans and After Action Reports Copyright © 2013
  • 15. Bus Industry Peer Advisory Group Staying Ahead of the Curve Peer Advisory Group (PAG)
  • 16. Surface Transportation Security National Mass Transit, Passenger Rail, & OTRB Security Strategy
  • 17. Risk-Based Security Strategy • Aligned with TSA Principles of Risk-Based Security across all modes of Surface Transportation • Focuses resources at higher relative risk locations and assets • Completely responsive to risk • Intelligence driven Implementation of Risk Reduction Programs • Levels of unpredictable operational deterrence and response measures driven by intelligence-based threat scenarios and levels • Measures include: • Unpredictable operational deterrence • Preparedness and response exercises • Improve critical infrastructure resilience • Front employee training • Public Awareness “If you see something, say something” 17
  • 18. Achieving Desired Outcomes The privacy and civil Strategic Overall casualties The general public People and goods liberties of individuals perceives surface move freely within and entities that own, Outcomes from terrorist attacks transportation to be surface transportation operate or use are limited safe and secure modes transportation systems are protected Approaches DETERRENCE DETECTION RESILIENCE (to meet these outcomes) Respond to all Proxy Create a minimum emergency related Limit disruption and 25% perceived restore normal or Measures of likelihood of events within 10 min, alternative operations non-emergency within within 12 hours Effectiveness interdiction 20 min 18
  • 19. Objective: Effective Deterrence Target: Create a minimum 25% perceived likelihood of interdiction at high risk locations and critical assets Achieving this standard requires LIKELIHOOD OF INTERDICTION presence and credibility 100% • Presence of visible security measures — Security and Canine Patrols are randomly present at high risk locations and critical assets in system for at least 25% of operating hours (120 minutes/8 hours). Standard — CCTV Cameras cover of 100% of the high risk locations threshold if and critical assets in system. interdiction results in • Credibility of security measures 25% detain and arrest — For the purposes of this analysis, credibility of security measures—the likelihood that a given security measure Minimum would achieve its objective—was assumed to be 100% 2% threshold if (anything less would require more presence) interdiction results in detain and arrest 0% 19
  • 20. Objective: Effective Detection & Response Target: Respond to all emergency related events within 10 min, non-emergency within 20 min SECURITY PERSONNEL Resolution involves having the ability to RESPONSE TIME detect a threat and respond appropriately Respond to at least 80% of • Detect 100% of suspicious activity that matters immediate incidents in 20 — The travelling public, frontline employees, and security 20 min. mins. (British , Transport personnel are sufficiently informed and motivated to Police detect suspicious activity and make relevant and timely standard)⁴ reports. Mid-range average • Ability to respond appropriately within 10 10 response time min. minutes to identified suspicious activity Average Emergency Response Time — Within 20 minutes, reporting of suspicious activity must be 5 min. Goal (BART)⁵ communicated, analyzed, and, as appropriate, security Emergency personnel dispatched and arrive on scene. 3 min. response time to Oklahoma 0 min. City bombing⁶ 20
  • 21. Objective: Effective Resilience Target: Limit service disruption and restore to 90% normal or alternative operations within 12 hours Achieving this standard requires limited direct SYSTEM RESTORATION TIME consequences, robust transportation Re-opening of alternatives, and 12 hour restoration time. affected track after June 2009 WMATA Red • Limited direct consequences of incidents 5 days Line crash⁸ — Infrastructure hardening and incident response activities Mid-range average system limit immediate casualties and damage to infrastructure. restoration 12 time • Robust transport alternatives to reroute flows hours Restoration — System redundancy and individual resilience efforts after 1995 6 hours Paris metro create alternative transportation routes & alternatives to attack⁹ transportation. Conclude police activity • 12 hours to restoration of full system service which disrupts 1.5 train service — Recovery capabilities ensure timely restoration of hours (British Trans. system to full operating status. Police 0 hours standard)¹⁰ 21
  • 22. QUESTIONS? Doyle Raines Ron Masciana Division Director Technical Counselor Surface Division Surface Division Office of Security Policy Office of Security Policy and and Industry Engagement Industry Engagement 571-227-3982 571-227-5672 Christopher T. McKay Fred Goodine Branch Manager Section Chief Mass Transit and Passenger Rail Mass Transit and Passenger Rail Surface Division Surface Division Office of Security Policy and Office of Security Policy and Industry Industry Engagement Engagement 571-227-2160 571-227-1725 This Strategy was developed in coordination with the Mass Transit Sector Coordinating Council (Transit Security Peer Advisory Group) Chief Paul McMillan, Massachusetts Bay Transit Authority, Chairman. 22
  • 23. Peer BISC Project Updates Advisory Group • Cyber Security • Human Trafficking • Active Shooter Protocols in a Moving or Stationary Bus 9 April 2013 Bus Industry Peer Advisory Group (PAG) 23
  • 24. Peer Collaborative Projects Going Forward Advisory Group • Convert “Mass Transit Security Strategy” to Motorcoaches • OTRB TRIAD Reports Motorcoach Transportation Security Strategy 9 April 2013 Bus Industry Peer Advisory Group (PAG) 24
  • 25. Bus Industry Safety Council (BISC) • Consider attending and joining one of the committees • Reimbursed $500 and 4 meals paid • June 11 and 12 in Herndon, VA • For more information, email Matt Cahill mcahill@buses.org Copyright © 2013
  • 26. Complete details at www.buses.org Copyright © 2013
  • 27. Quarterly Security Meeting • Exercise • Security topic • Update on latest threats to post to Terrorism Awareness Board • Security trends or problems within the company • Exercise Plans and After Action Reports Copyright © 2013
  • 28. See poster – next slide After discussion, the document will be posted on the Terrorism Awareness Board Copyright © 2013
  • 29.
  • 30. Quarterly Security Meeting • Exercise • Security topic • Update on latest threats to post to Terrorism Awareness Board • Security trends or problems within the company • Exercise Plans and After Action Reports Copyright © 2013
  • 31. General Discussion or Security Topic Copyright © 2013
  • 32. 2 Simulated Explosives Found in NY and CA
  • 33. Bus Industry Peer Advisory 9 April 2013 33 Group (PAG)
  • 34. Bus Industry Peer Advisory 9 April 2013 34 Group (PAG)
  • 35. Bus Industry Peer Advisory 9 April 2013 35 Group (PAG)
  • 36. Bus Industry Peer Advisory 9 April 2013 36 Group (PAG)
  • 37. Bus Industry Peer Advisory 9 April 2013 37 Group (PAG)
  • 38. $189,000,000 • Discretionary Funds from Congress to TSA • Recommend you write your congressmen and tell them you would like an Intercity Bus Grant with some of those funds Copyright © 2013
  • 39. Contact Your Congressmen Copyright © 2013
  • 40. Contact Your Congressmen Copyright © 2013
  • 41. Contact Your Congressmen Copyright © 2013
  • 42. Contact Your Congressmen Copyright © 2013
  • 43. “I h e a r d TSA r e c e i v e d $189 m i l l i o n i n d i s c r e t i o n a r y f u n d s . Pl e a s e c o n t a c t t h e TSA A d mi n i s t r a t o r a n d l e t h i m k n o w we c a n u s e t h i s f o r
  • 44. Quarterly Security Meeting • Exercise • Security topic • Update on latest threats to post to Terrorism Awareness Board • Security trends or problems within the company • Exercise Plans and After Action Reports Copyright © 2013
  • 45. Document This Training • Write a report describing today’s training or wait to receive the Minutes from CAT Eyes • NOTE: examples can be found in Appendix J of your SEP • Post your report in Appendix J Copyright © 2013
  • 46. Next Quarterly Security Meeting will be held in July 9, 17 and 26. You will receive an invitation. Bomb Threat and Building Evacuation Copyright © 2001- 2007 Copyright © 2013
  • 48. Documentation • To receive Minutes and other documentation from today’s meeting: – Go to www.dropbox.com – Sign in: CEQSM@hotmail.com – Password: bus1234 – Open the file labeled “Documents to Accompany QSM (Q2 - Shelter)” Copyright © 2013
  • 49. Documentation • Posters should be displayed on your Terrorism Awareness Board • Post the Minutes in Appendix J of your SEP • The meeting was also recorded – “Quarterly Security Meeting (Q2 - Shelter) – narrated” in the same dropbox account Copyright © 2013
  • 50. Conclusion • This concludes today’s meeting • Direct any questions to frankm@cateyes.us Copyright © 2013

Editor's Notes

  1. Conduct an exercise (see the Multiyear Exercise Plan in your SEP, which is also listed on Slide 2 of this presentation). Quarterly exercises are a very practical way to ensure your company is prepared for a security issue.Security Topic: comb through the various resources you now have at your disposal, such as HSIN, TRIAD Reports, info from the FBI InfraGard website (www.infragard.net), and other resources. Discuss this with the group.Update on latest threats.Security trends: with the ALERT Team assembled, discuss any security trends or problems within the company. Suggestion – invite local law enforcement, fire, EMS, to brief the ALERT Team on this topic.Exercise Plans and After Action Reports are to be filed in your SEP, Appendix J. This will demonstrate to auditors that you are putting ‘shoe leather’ to the plans contained in your SEP, taking an active approach to security issues.
  2. Discuss:“Bring everyone into the room(s)” – who knows where the room is?“Shut and lock the doors” – what are the procedures to do this? Ask customers … to stay” – why is this important?Call emergency contacts – all involved should call
  3. 1. “Call forwarding” – use the Call Forwarding feature on your phone to receive important calls.“Change business phone announcement …” - Turn on call-forwarding or alternative telephone answering systems or services. If the business has voice mail or an automated attendant, change the recording to indicate that the business is closed, and that staff and visitors are remaining in the building until authorities advise it is safe to leave.“Turn off HVAC system …” – Have employees familiar with your building’s mechanical systems turn off all fans, heating and air conditioning systems. Some systems automatically provide for exchange of inside air with outside air – these systems, in particular, need to be turned off, sealed, or disabled. Water – fill a sink with water, fast.
  4. 1. “Avoid overcrowding” - Select interior room(s) above the ground floor, with the fewest windows or vents. The room(s) should have adequate space for everyone to be able to sit in. Avoid overcrowding by selecting several rooms if necessary. Large storage closets,utility rooms, pantries, copy and conference rooms without exterior windows will work well. Avoid selecting a room withmechanical equipment like ventilation blowers or pipes, because this equipment may not be able to be sealed from theoutdoors.Ideal … hard wired telephone” – cell phone lines may be congested. Also, you can use your GETS account on a land line.“Evac Kit and disaster supplies” - Gather essential disaster supplies, such as nonperishable food, bottled water, battery-powered radios, first aid supplies, flashlights, batteries, duct tape, plastic sheeting, and plastic garbage bags.
  5. There may be a poster associated with what we are discussing or the poster may be totally unrelated and just be an interesting security topic
  6. Speaker would speak about Homeland Security Programs in the local area or just plain security programs or exercises or training or do they need any buses for any disasters or exercises. SWAT Teams have practiced on buses. If no speaker available, ask ALERT Team members for contacts to talk about InfraGard meetings, something they heard at BISC, or at a local security meeting for state or city.Also any robberies, threats, new security purchased. Any trespassing. Fence was cut, no one is wearing security badges, rash of robberies in the local area, doors being left unlocked, etc.
  7. SGT Dustin Davis(Santa Clara Sheriffs RATTF) stated the device was a functional M116A1 grenade simulator (picture attached) found inside a small shaving kit type bag. There were no suspects or witnesses and the item did not deploy. If it did deploy the risk to public safety would be minimal. The bag was found on last bench at the stop, seated on top of the bench, toward the edge. He also mentioned a person would have to dig into the bag to see the device. SGT Davis did not feel the scene provided any indication the device of intentionally left, more likely it fell out of someone's bag, NFI. The NY incident has been closed and there is no additional information to pass on. However, they may still be able to provide a picture of the device. As soon as it comes in I will pass it on.
  8. Question and Answer session. Document.