StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Response to a Potential Terrorist Attack on Critical Infrastructures and Key Assets - Case Study Example

Cite this document
Summary
This case study "A Response to a Potential Terrorist Attack on Critical Infrastructures and Key Assets" is presenting a plan to work with private and public stakeholders to prepare for, respond to, and recover from a potential terrorist attack on critical infrastructures and key assets. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
A Response to a Potential Terrorist Attack on Critical Infrastructures and Key Assets
Read Text Preview

Extract of sample "A Response to a Potential Terrorist Attack on Critical Infrastructures and Key Assets"

Running Head: Public and Private Plan Public and Private Plan: A Response to a Potential Terrorist Attack On Critical Infrastructures and Key Assets Abstract Given the scenario that as the homeland security or emergency management director in a county with a privately owned critical infrastructure or key asset that could be a possible target for a terrorist, this essay is written with the objective of presenting a plan to work with private and public stakeholders to prepare for, respond to, and recover from a potential terrorist attack on the facility. The plan would include the elements of the National Incident Management System (NIMS), as required. Introduction In an organization or in a county, on a national scale, the role that homeland security and emergency management assumes is of critical importance in safeguarding all the resources from potential terrorist attacks. Resources mean assets and human personnel, including all systems and processes contained therein. The scope of responsibilities in security and safety includes detection of any kind of intrusion and initiating appropriate actions to ward off and prevent harm or damage to the county, and in preparing, responding and recovering from potential terrorist attacks. On a national scale, the level of protection in resources encompasses critical infrastructures and key assets which are identified to be of primary importance. This paper is written the objective of presenting a plan to work with private and public stakeholders to prepare for, respond to, and recover from a potential terrorist attack on critical infrastructures and key assets. The plan would include the elements of the National Incident Management System (NIMS), as required. The National Incident Management System (NIMS) The danger and havoc that terrorism creates in terms of loss of human lives, properties and destruction of the environment cannot be underestimated. As such, local and national agencies have painstakingly prepared for a comprehensive and implementable process to address such eventualities through the National Incident Management System. According to the US Department of Homeland Security (USDHS, 2004, 2), the NIMS embody pertinent concepts, principles, terminologies and process required for the efficient coordination of all responding agencies in terms of preparing, responding and recovering (PRR) from all domestic incidents including terrorist attacks. The NIM elements that provide the framework for all concerned agencies to follow in PRR are as follows: (1) Command and Management which identifies authorized personnel to work on PPR and appropriate emergency measures; (2) Preparedness outlines planning including definition of objectives and alternative courses of action; (3) Resource Management stipulates allocation of resources and establishment of standards and guidelines for implementation; (4) Communications and Information Management proffers collaboration and coordination between agencies on levels of communication and information as well as updates on systems and equipment needed; (5) Supporting Technologies include modeling, simulation and analysis of scenarios; and (6) Ongoing Management and Maintenance monitors the overall plan in terms of deviations from plans. Critical Infrastructures and Key Assets According to the US Patriot Act, critical infrastructures are defined as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” (USDHS, 2003, 6). The sectors that belong to the critical infrastructures classification are: agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking and finance, chemical industry and hazardous materials and postal and shipping. (USDHS, 2003, 6). Key assets, on the other hand, are identified as potential terrorist targets that when destroyed, would cause loss to human lives, properties and environment on a scale large enough that it would stain the nation’s prestige and confidence. Included in this classification are “such facilities as nuclear power plants, dams, and hazardous materials storage facilities.” (USDHS, 2003, 7). Public and Private Plan 1. Command and Management: As the head of homeland security and emergency management, the first and foremost task is the identification of critical infrastructure and key areas in every local jurisdiction. After which, command and management are exemplified through identification and delegation of authorized personnel assigned to head and overlook emergency measures in terms of ensuring the safety of each community and private enterprises within their local areas. In terms of the private sector, specific responsibilities in risk planning and security management are employed. The role of homeland security is to advise them on the additional measure they should be aware of to address risks of potential terrorist attacks in critical infrastructures and key assets owned and operated by the private sector. 2. Preparedness and Resource Management: The preparation stage requires appropriate planning and allocation of resources from local, state and federal agencies, as well as the private sector stakeholders. This phase needs collaboration of all mentioned in implementing the following activities: (1) defining specific objectives for their identified critical infrastructures and key assets; (2) developing an alternative course of action to rationalize the need for increased security in identified areas; (3) establishing standards for security baseline and guidelines; and (4) forecasting required incentives to promote increased security-related services. (USDHS, 2003, 23). 3. Communication and Information Management: To ensure that appropriate information is disseminated in all levels of the governmental hierarchy, a close coordination and collaborative efforts are necessarily required. In this phase, the following activities are eminent: (1) a comprehensive collection of improved information regarding potential threats; (2) each agencies’ evaluation and assessment of the relevant threats identified; (3) an system of warning must be structurally installed; and (4) there should be an efficient coordination to communication efforts across various agencies. 4. Supporting Technologies: According to the USDHS, “protecting our Nation’s critical infrastructures and key assets against this threat will require a systematic, national effort to fully harness our research and development (R&D) capabilities.” (2003, 31). To enable the federal government to ensure that appropriate technological standards and research updates are being pursued, the following measures must be undertaken: (1) a close coordination in public and private sectors’ technological and research endeavors; (2) ensure compatibility in communication systems through coordinating standards of interoperability; (3) improve methods to verify authenticity of personal identities; and (4) monitor the update of surveillance systems; among others. 5. Competent Personnel and Human Capital: This phase requires recruitment, maintenance and development of competent and qualified personnel to adhere to the highest standards of ensuring the safety of critical infrastructures and key assets. The relevant aspect to consider is to prevent an insider or unsatisfied personnel from conducting “sabotage activities or facilitating terrorist access to a critical facility or system.” (USDHS, 2003, 28) Vigilance and continuous monitoring is critical in developing national standards for personnel surety. A database for background screening of personnel must be in place for timely and accurate verification. There should be a continuous training for security officers to update them on current terrorist plots. 6. Modelling, Simulation and Analysis: This phase is necessary in the plan to PRR “by enabling the mapping of complex interrelationships among the elements that make up the risk environment.” (USDHS, 2003, 33). A proactive stance in evaluating potential terrorist attacks is undertaken through forecasting possibilities and planning reactive response to a variety of scenarios. This requires coordination and effective partnering of local, state and federal agencies in developing models and applying simulation techniques. The modeling and simulation approach must be integrated in the national infrastructure and protection planning stage to prepare for decision-making capabilities. Risk management techniques would be highlighted and proposed counter terrorist measures outlined for future eventualities. Conclusion Countries around the world have high regard for their national treasures in terms of landmarks and monuments or critical infrastructures and key assets. As such, these treasures are primary targets of potential terrorists due to the value of national heritage they manifest. With increasing complexities of terrorist weapons and techniques threatening various governments, a comprehensive plan must be outlined and tediously undertaken to ensure that protective measures are in place. Lead local, state and federal agencies are all involved in the preparation and implementation of a comprehensive plan to prepare, respond and recover from potential terrorist plots. The success of the plan is measured in terms of public and private sectors’ awareness on the availability and accessibility to critical response scenarios in safeguarding the identified critical infrastructures and key assets from the local level up to the national scale. As appropriately concluded, the US Department of Homeland Security, the lead agency involved in safeguarding critical infrastructures and key assets, warned that “Make no mistake—the road ahead will be fraught with challenges. Unified in our approach, however, we will overcome these challenges and secure our critical infrastructures and key assets from terrorist exploitation.” (USDHS, 2003, 82). It actually takes serious planning, comprehensive and collaborative efforts and the determination to fight terrorism at all cost. The elements indicated in the National Incident Management System (NIMS) forms the framework for a workable plan at all levels – from the local agencies, to state and federal offices. The critical part of the plan is the identification of the critical infrastructures and key assets in each locality and defining how each could be protected from terrorist attacks. The response procedures must be communicated effectively to all concerned to ensure that any potential terrorist activity would be out rightly prevented. References US Department of Homeland Security. (2004). National Incident Management System. Retrieved 23 January 2010. < http://www.nrt.org/Production/NRT/NRTWeb.nsf/AllAttachmentsByTitle/SA- 385aNIMS-90-web/$File/NIMS-90-web.pdf US Department of Homeland Security. (2003). The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. Retrieved 23 January 2010. < http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf> Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(A Response to a Potential Terrorist Attack on Critical Infrastructures Case Study, n.d.)
A Response to a Potential Terrorist Attack on Critical Infrastructures Case Study. https://studentshare.org/management/1732490-public-and-private-plan-paper
(A Response to a Potential Terrorist Attack on Critical Infrastructures Case Study)
A Response to a Potential Terrorist Attack on Critical Infrastructures Case Study. https://studentshare.org/management/1732490-public-and-private-plan-paper.
“A Response to a Potential Terrorist Attack on Critical Infrastructures Case Study”. https://studentshare.org/management/1732490-public-and-private-plan-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Response to a Potential Terrorist Attack on Critical Infrastructures and Key Assets

Memories of 9/11 Rushing Out

"While the primary responsibility for initial incident response remains at the local level, using locally available assets, special capabilities for prevention or response may also require Federal and private-sector resources in the case of the most dangerous and complex threats" http://www.... I will act for ensuring the security of homeland is imperative while preventing imminent incidents, restoring the critical infrastructure of key resources, enforcing law investigations....
3 Pages (750 words) Essay

The Challenge Of Protecting Food And Agriculture Production

Although both sides have some really pertinent points to justify their claims, one would argue that despite its being effective, the protection of the food and agriculture production sector of the critical infrastructure has not lost its relevance in the United States.... The paper "The Challenge Of Protecting Food And Agriculture Production" discusses a plan of action that was formulated by the American government to ensure that it is able to protect its food production against terrorist attacks as well as against natural disasters… Innovation is one of the most fundamental aspects of the modern world because it gives different organizations an advantage over its competitors....
8 Pages (2000 words) Research Paper

The Conduct of the UK Fire Control Program

It was believed that the project would have offered a systematic and coordinated response to wide arrays of emergencies like terrorist attacks, natural calamities, and rail crashes.... "The Conduct of the UK Fire Control Program" paper suggests how the successful utilization of the best possible strategies would have helped in mitigating the problems to an extent leading to better solutions and improved benefits....
16 Pages (4000 words) Coursework

A Process Develop a Business Continuity Plan

Other important aspects to be covered verification that all the critical activities have been involved in the plan and lastly is to analyzing the effectiveness of the proposed plan in ensuring that normality is restored to the organization incase of disruption.... Just like many other organizations, this particular company is at risk of threats such as flooding, electrical or gas faults, flooding, saobotage of products and terrorist attacks that may cause serious damages to the company....
11 Pages (2750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us