Home / Essays / UNCLASSIFIED CERTIFIED IN HOMELAND SECURITY LEVEL 4 (CHS-IV)

UNCLASSIFIED CERTIFIED IN HOMELAND SECURITY LEVEL 4 (CHS-IV)

American Board For Certification In Homeland Security
.
UNCLASSIFIED
1
COPYRIGHT
This ABCHS Presentation is copyrighted material and as such, any reproduction, distribution, and/or further use of this material is strictly prohibited, without the express written approval and consent of The American Board For Certification In Homeland Security.
© 2010 The American Board For Certification In Homeland Security A Unit Of The American College Of Forensic Examiners Institute
2
Abstract
CHS-IV is the fourth of a five-part series of certifications. It is designed to build on the knowledge of the student who has successfully completed CHS-I, CHS- II, and CHS-III. Specifically, CHS-IV aims to greatly expand the participant’s knowledge of both Weapons of Mass Destruction (WMDs) and the terrorists who use them in their assaults against the free nations of the world.
CHS-IV presents in-depth information giving participants advanced exposure to terrorists and terrorist organizations that use WMDs. Participants review case studies of significant overseas terrorist incidents involving the use of WMDs. Through the case studies, they observe how WMDs influence the politics of nation-states.
3
Abstract
Areas of emphasis include terrorist groups and WMD identification, response to WMD use, and actions to mitigate WMD effects. In particular, the “mechanisms-of-injury” related to specific WMDs are addressed. Also addressed specifically are standard medical protocols for treating the effects of various chemical, biological, radiological, and nuclear explosive WMDs and estimates for successful recovery to such exposures (informed by medical and actuary statistical data).
All Americans will likely be involved in, or required to respond to, a WMD attack at some point in their lifetime. Regarding such attacks, it has been stated repeatedly, “It’s not if but when, and it’s only a matter of time”. In this light, individuals holding advanced certification in homeland security must be well- versed in the mindset of the terrorist and also be familiar with rationale the terrorist uses in weapon selection. 4
Learning Objectives
As a result of successfully completing CHS-IV, the student will be able to: •  Compare chemical, biological, radiological, nuclear, and high-yield explosives (CBRNE); •  Demonstrate CBRNE preparedness; •  Discuss recent CBRNE cases (i.e. events, attacks, etc.); •  Describe CBRNE event analysis; •  Describe improvised explosive devices (IEDs); •  Assess medical, physiological, and personnel management considerations of a CBRNE event; •  Identify the actions of major terrorist groups in the world; •  Plan operations to be utilized in a NIMS and ICS environment.
5
Key Words
Weapons of Mass Destruction (WMD); Chemical, Biological, Radiological, and Nuclear Explosives (CBRNE); Improvised Explosive Device (IED); Radiological Dispersion Device (RDD); Delivery Systems; Dirty Bomb; Event Analysis; Toxic; Chemicals; Virus; Bacteria; Toxins; Symptoms; High Explosives (HE); Symptoms; Treatment; Primary Explosive; Secondary Explosive; Tertiary Explosive; Time; Distance; Shielding Blister Agents; External Contamination; Internal Contamination; Stimuli; Red Zone; Yellow Zone; Green Zone; Osama bin Laden; Al-Qaida; Madrid Train Bombing; London Tube Bombing; Hezbollah; Hamas; Palestine Liberation Organization (PLO); Party of God; Jihad; National Incident Management System (NIMS); Incidence Command System (ICS); Span of Control; Unity of Command.
6
Target Audience
Private industry, non-government organizations (NGOs), state and federal government employees (to include military personnel), first responders (police, fire, EMS, etc.), and all who are responsible for security and disaster preparedness as a part of their job description and/or duty assignment.
7
Program Level
Advanced
8
Prerequisites
Successful completion of CHS-I, CHS-II, and CHS-III; successful completion of FEMA IS-100.a, FEMA IS-700.a NIMS, and FEMA IS-800.b NRF; a basic knowledge of WMD; an advanced familiarization with The War on Terror; and a cursory knowledge of recent terrorists attacks and their effects on the world geopolitical system.
9
CHS-IV COURSE TABLE OF CONTENTS Lesson 1 – Homeland Security, Terrorism, and Catastrophic Events
Lesson 2 – CBRNE Used as WMD
Lesson 3 – Chemical Agents Used as WMD
Lesson 4 – Biological Agents Used as WMD
Lesson 5 – Radiological Materials and Nuclear Weapons Used as WMD
Lesson 6 – Explosive Devices Used as WMD
Lesson 7 – Examples of CBRNE Terrorists Groups and Notable Terrorist Acts
Lesson 8 – Significant and Most Notable Terrorist Acts in Recent Times
Lesson 9 – National Incident Management System and Incident Command System
10
INTRODUCTION
This CHS-IV certification differs substantially in format of presentation from the other CHS certifications that you have taken thus far.
The other CHS courses were prepared in written paragraphs (or a text format).
The CHS-IV course is constructed in a PowerPoint format with bullet points because this CHS-IV course is presented as both as a live PowerPoint presentation and an online course.
Due to its importance in the war against terrorism, some of the material herein is intentionally repeated to ensure proper reinforcement and retention by those intending to certify ultimately at all five levels.
Therefore, whether presented in text or PowerPoint format, the CHS-IV course objectives and outcomes are the same If successfully completed—certification at the CHS-IV level and the ability to proceed to the CHS-V certification course of instruction.
11
FOREWORD
In CHS-III, students were introduced to Weapons of Mass Destruction (WMD).
In CHS-IV, students will expand their knowledge of the tools the terrorist uses by delving into a more technical and detailed account of WMD.
In today’s world we face the continued specter of terrorism on a global scale.
As a result, it is incumbent upon professional practitioners of homeland security to possess an in-depth, specific, and detailed knowledge of both the major terrorist groups in the world and their past acts of terrorism, as well as the various types and characteristics of each WMD that may be deployed.
Upon successfully completing CHS-IV, the student will be permitted to progress to CHS-V.
CHS-V is the ABCHS capstone and the highest level of certification in homeland security the nation has to offer.
12
PLEASE NOTE
•  Due to the likelihood that the United States of America will be attacked by a weapon of mass destruction in the future, portions of CHS-IV are intended as a review of material previously presented in other CHS certifications.
•  This is done to ensure the student has a firm grasp of the nature of the threat as well as what they will eventually face in the field.
•  Therefore, the material that has been presented in previous CHS certifications is considered testable at the completion of CHS-IV.
13
LESSON ONE
Homeland Security, Terrorism, and Catastrophic Events
14
September 20, 2001 (From http://www.usatoday.com/printedition/news/20110112/obama12_tb.art.htm)
“The advance of human freedom—the great achievement of our time, and the great hope of every time—now depends on us. Our nation—this generation—will lift a dark threat of violence from our people and our future. We will rally the world to this cause by our efforts, by our courage. We will not tire, we will not falter, and we will not fail.”
President George W. Bush to the American people September 20, 2001
15
The National Strategy for Homeland Security (From Homeland Security a Documentary History by Bruce Maxwell and http://www.dhs.gov/xlibrary/assets/nat_strat_hls.pdf )
•  On July 16, 2002, the White House released “The National Strategy of Homeland Security.”
•  It was the first such document in the nation’s history.
•  The ninety-page report officially defined homeland security as “a concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, and minimize the damage and recover from attacks that do occur.”
•  The report divided homeland security functions into six areas: 1. Intelligence and Warning 2. Border and Transportation Security 3. Domestic Counterterrorism 4. Protecting Critical Infrastructure 5. Defending Against Catastrophic Terrorism 6. Emergency Preparedness and Response
16
Terrorism and Emergency Preparedness Facts (From the Associated Press) In a recent government report, only six U.S. cities received acceptable or satisfactory ratings for effective communication among their emergency agencies during a disaster (i.e., fire department, law enforcement, emergency management, emergency medical services, etc.).
The highest ratings went to San Diego, CA Minneapolis-St. Paul, MN Washington, D.C. Columbus, OH Sioux Falls, SD Laramie County, WY
The lowest ratings went to Chicago, IL Baton Rouge, LA Cleveland, OH Mandan, ND American Samoa
17
CBRNE (Unless specifically credited otherwise, the source of the material presented in this section is the American Board for Certification in Homeland Security) CHEMICAL BIOLOGICAL RADIOLOGICAL NUCLEAR EXPLOSIVES (high-yield)
18
Crisis Management
“There cannot be a crisis next week. My schedule is already full.” —Henry A. Kissinger
19
Crisis Management Rules
•  All incidents are manageable—the key is advance preparation •  Plan for the worst, hope for the best •  Quick action is essential •  Don’t confuse crisis management with public relations •  Don’t play the blame game—fix the problem •  Every crisis is an opportunity •  Don’t lie to the public
20
CBRNE Defined as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160 and http://www.law.cornell.edu/uscode/uscode18/usc_sec_18_00002332—a000-.html)
WMD as defined in Title 18 U.S.C. Section 2332(a)
“Any explosive, incendiary or poison gas, bomb, grenade, rocket having a propellant charge of more than four ounces, or a missile having an explosive or incendiary charge of more than one quarter ounce, or mine or similar device”
“Any weapon that is designed or intended to cause death or serious bodily injury through the release, dissemination, or impact of toxic or poisonous chemical or their precursors.”
“Any weapon involving a disease organism.”
“Any weapon that is designed to release radiation or radioactivity at a level dangerous to human life.”
21
Catastrophic Events Involving CBRNE and Preparedness (Unless specifically credited otherwise, the source of the material presented in this section is the American Board for Certification in Homeland Security)
22
Do you have an emergency plan?
23
CBRNE Preparedness = Decisions … Decisions … Decisions … (From the American Board for Certification in Homeland Security)
24
CBRNE Preparedness (From the American Board for Certification in Homeland Security)
Event Analysis:
A. Medical B. Physiological
C. Personnel Management Considerations
25
CBRNE Preparedness (From the American Board for Certification in Homeland Security)
Event Analysis (continued):
A. Medical
1. Victims
2. Witnesses
3. Responders
4. Media
5. Greater society not directly involved
26
CBRNE Preparedness (From the American Board for Certification in Homeland Security)
Event Analysis (continued):
B. Physiological
1. Victims
2. Witnesses
3. Responders
4. Media
5. Greater society not directly involved

27
CBRNE Preparedness (From the American Board for Certification in Homeland Security)
Event Analysis (continued):
C. Personnel Management
1. Victims
2. Witnesses
3. Responders
4. Media
5. Greater society not directly involved
28
CBRNE Preparedness (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Preparation consists of the following items and/or actions:
1. Situational Awareness •  Suspicious persons •  Suspicious vehicles •  Suspicious actions/objectives 2. Proper Training (i.e., initial and refresher, as well as regularly scheduled joint exercises and drills)
3. Proper Equipment (properly maintained and periodically tested)
29
CBRNE Preparedness (From U.S. Department of Homeland Security WMD Awareness Training Student Manual AWR-160)
Suspicious Vehicles:
•  Vehicles left unattended, abandoned, or that appear to be out of place
•  Any vehicle suspected of doing mobile surveillance such as automobiles carrying camera equipment or vans with tinted windows near potential targets
•  Vehicles with removable decals or signage that has been painted over or altered
•  Altered frames, such as cutouts in the body of the vehicle
30
CBRNE Preparedness (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Suspicious Persons:
Individuals who •  Arrive and depart locations at odd times of the day or night, using vehicles or other means of conveyance
•  Suspiciously exit a secured, nonpublic area near a train or bus depot, airport, tunnel, bridge, government building, or tourist attraction
•  Stay at bus or train stops for extended periods while buses and trains come and go •  Don’t fit into the surrounding environment because they are wearing improper attire for the location or season
•  Exhibit suspicious behavior such as staring or quickly looking away from individuals or vehicles as they enter or leave facilities or parking areas
31
CBRNE Preparedness (From U.S. Department of Homeland Security WMD Awareness Training Student Manual AWR-160)
Suspicious Actions/Objects:
•  Suspicious packages, luggage, or mail abandoned in a crowded place such as an office building, airport, or school
•  Chemical fires, toxic odors, or brightly colored stains in apartments, motel rooms, or self-storage units
•  Unusual test explosions in rural or wooded areas
•  Purchase of or illicit access to facility blueprints
•  Parcels, packages, or luggage left unattended
•  Heavy mailed packages with excessive postage
32
CBRNE Preparedness (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual WAR-160)
Suspicious Actions/Objects (continued):
•  Unusual behavior, such as staring/quickly looking away from personnel or vehicles entering/leaving designated facilities/parking areas
•  An increase in anonymous telephone or e-mail threats to facilities in conjunction with suspected surveillance incidents
•  Questioning of security or facility personnel
•  Any unusual activity or circumstance in your neighborhood, community, or workplace
33
CBRNE Self-protection (From the American Board for Certification in Homeland Security)
Time element Source Result Dose
Alpha, Beta, Gamma, HE, ChemBio,
1 meter 1 meter Dose Rate Source Distance element
Shielding element
PAPER LEAD
34
Radiation Self-protection
•  The amount of radiation exposure and the dose received will depend on the type and strength of the radiation source. •  This exposure can be stopped or reduced by the effective use of time, distance, and shielding. •  In order to avoid inhaling or ingesting radioactive materials, the Department of Energy recommends using a full-face respirator in any radiologically contaminated area. •  Personal protective equipment will be discussed in the operations course.
35
Radiation Self-protection
•  OSHA Level A or other chemical protective clothing will not affect whole-body exposure to gamma radiation from an external source. •  Lead-lined gloves and aprons are a form of shielding which will reduce external gamma radiation exposure but will not totally eliminate it. •  A respirator will provide adequate protection from inhalation of airborne radioactive particulate materials. This will lessen the potential for internal contamination and minimize exposure to radiation from an internal source. Respiratory protection will be covered later. •  The intent of using time, distance, and shielding as protection is to reduce the radiation exposure to a level as low as reasonably achievable. Due to background radiation and the need to have responders operating near the radiation source, not all of the radiation exposure can be completely eliminated.
36
Do you have an emergency plan?
37
38
39
Categories of CBRNE as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
A commonly accepted method for categorizing WMD is by using the acronym CBRNE.
C —  Chemical agents, including Toxic Industrial Chemicals (TIC) that may be used as WMD (HAZMAT)
B —  Biological hazard
R —    Radiological hazards
N —    Nuclear hazards
E —    Explosives
40
Recognizing a CBRNE WMD Release (From the American Board for Certification in Homeland Security) •  Symptoms of victims •  Mass casualties •  Casualty pattern •  Dissemination device •  Warning given or credit taken •  Other indicators – Dead mammals or birds – Victims statements – Unexplained liquids/aerosols/particulates (powders)/ strange odors
41
Recognizing a CBRNE WMD Release (From the American Board for Certification in Homeland Security)
Think About It During a foreign flag ship inspection, several crew members were found sick or dead. Could this be the result of a biological attack?
42
Recognizing a CBRNE WMD Release
Responders may arrive at an incident such as a HAZMAT, fire, or explosion long before it is known to be a WMD incident. 1. Symptoms of victims: The first indication that you may have a WMD attack will be the observed symptoms of the agent in the victims. Chemical agents have unique symptoms that differentiate them from other illnesses. Keep in mind that most biological agents and many chemical agents do not cause patients to exhibit these symptoms until several hours after the initial exposure. Radiological agents may not result in symptoms for days or possibly years. 2. Mass casualties: Another strong indication that this is not a natural occurrence is the massive number of casualties all having severe cases of the same disorder. 3. Casualty pattern: Casualties downwind of an area or limited to specific enclosed areas also indicate a wind-borne hazard. 4. Dissemination device: Someone may find the actual dissemination device, if it did not explode, or may view the device functioning. Any unusual spraying or low-order explosion surrounded by a cloud is a tell-tale sign of a WMD release. 5. Warning given or credit taken: A warning of an impending attack or a proclamation of credit may indicate the attack included a WMD agent even if there were no immediate symptoms observed.
43
Lesson One Review
As a result of having completed Lesson One you should be able to answer the following questions:
1. When was “The National Strategy of Homeland Security” released?
2. How many areas is “The National Strategy of Homeland Security” divided into?
3. In what Title of the U.S.C. (or United States Code) is WMD defined?
4. What are the three CBRNE self-protection elements?
5. How can you recognize a CBRNE release?
44
LESSON TWO
CBRNE Used as WMD
45
Chemical, Biological, Radiological, Nuclear, and High-yield Explosive (CBRNE)
Used as
Weapons of Mass Destruction (WMD)
( Unless specifically credited otherwise, the source of the material presented in this section is the American Board for Certification in Homeland Security)
46
CBRNE WMD Response (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Terrorist Tactics
Terrorists possess a wide range of tactics and an even greater range of targets. •  The goal is to inflict mass casualties or disrupt critical infrastructure. •  Secondary devices may be used, which are generally intended to injure or kill responders. •  There may be multiple incidents. •  There may be a rapid escalation of the hazards.
“ We have to be right 100 percent of the time…a terrorist only has to be right once.” —President George W. Bush 47
48
Zone Nomenclature (From Colonel Andrew J. Jurchenko, United States Army, Retired, CHS-V)
WMD events consist of three zones as listed below:
Hot Zone: Sometimes referred to as the exclusion zone
Warm Zone: Sometimes referred to as the contamination reduction zone
Cold Zone: Sometimes referred to as the support zone
49
50 50
Important Concepts Regarding WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  The acronym RAIN stands for Recognize, Avoid, Isolate, and Notify. •  RAIN represents a concept to assist individuals in the facilitation of a timely and immediate response to a WMD Incident.
•  There are three appropriate actions one can take when mitigating the hazards from a WMD incident. They are 1) Evacuate, 2) Shelter-in-place, or 3) Isolate.
•  Analyzing and assessing the terrorist WMD threat and vulnerabilities are the critical elements and first steps for a community in developing a contingency plan.
•  The first general precaution used to protect oneself at a WMD incident is the donning of Personal Protective Equipment (PPE) before attempting any other actions at the scene.
51
Important Concepts Regarding WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  There are several activities that jurisdictions must undertake to prepare for a terrorist act. One of the most critical is recognizing the need for prevention activities and actions.
•  Critical infrastructures are potential terrorist targets.
•  Electrical power generation and transmission facilities are classified as critical infrastructures.
•  There are many challenges to identifying potential terrorist activities.
52
Important Concepts Regarding WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
And finally
•  Another challenge to identify potential terrorist activaties, is early recognition of anything that appears to be out of place.
53
Lesson Two Review
As a result of having completed Lesson Two you should be able to answer the following questions:
1.  What are the three WMD zones?
2.  What does the acronym RAIN stand for?
3.  What are the three appropriate actions one can take when mitigating the hazards of a WMD incident?
4.  According to President Bush a terrorist has to be right only once, but we must be right what percentage of the time?
54
LESSON THREE
Chemical Agents Used as CBRNE WMD
55
Chemical Warfare Agents (From the American Board for Certification in Homeland Security)
56
Introduction to Chemical Warfare Agents
•  This lesson will introduce some of the chemical agents in which either the United States or other nations have expressed interest for potential use on the battlefield. •  The lesson addresses these agents because a potential terrorist would most likely find these same chemical agents attractive to use in a domestic terrorist incident. Why? 1.  They are extremely toxic. 2.  Many are either readily available or not that difficult to make. 3.  There is a lot of information available about them. •  Bear in mind that responding to a chemical terrorist incident is in many ways very similar to responding to a HAZMAT incident. •  Chemical warfare agents are those chemical compounds that were considered for use on the battlefield. For the purposes of this course the terms “chemical agents” and “chemical warfare agents” will be used interchangeably.
57
Chemical Agents as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  Chemical incidents are characterized by the rapid onset of medical symptoms (minutes to hours) and easily observed signatures (colored residue, dead foliage, pungent odor, and dead insects and animal life).
58
Chemical Agents as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Chemical Agents General Information
1.  Types:  Refer to the ERG •  Military uses two alphabetical letters to identify chemical agents (GB, VX, etc.) •  Civilian industry uses names (Chemical Names, Trade Names/Synonyms) 2.  Dissemination:  How agent is disbursed 3.  Availability:  Controlled or commercially 4.  Volatility:  The rate at which a substance evaporates (persistent/non) 5.  Vapor density:  Mass per unit under standard temperature and pressure 11.  Odor:  Specific smell for each agent 12.  Routes of entry:  Several into the body: •  Inhalation •  Ingestion •  Absorption •  Injection 13.  General signs and/or symptoms
59
Advantages of Chemical Agents as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
1.  Easy to make or acquire 2.  Available 3.  Cheap 4.  Immediate effect 5.  Hard to detect 6.  Easily spread 7.  Tie up resources 8.  Psychological impact 9.  Next level of escalation
60
Disadvantages of Using Chemical Agents as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual WAR-160)
1.  Requires large quantities
2.  Production and deployment is hazardous to the terrorist
3.  Less difficult to prepare for
61
Chemical Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  Incapacitating Agents –  Irritants –  Lachrymators –  Tear Gas
•  Chemical Warfare Agents* –  Choking agents –  Nerve agents –  Blood agents –  Blister agents
* NOTE: All were solely designed as WMD on the battlefield and are lethal. Chemical warfare agents are classified according to their physiological affects or their military use. 62
Chemical Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Choking Agents 1.  Type: Classification based on physiological affects or military use = phosgene (CG) and chlorine (CI) 2.  Dissemination:  Solid, liquid, gas 3.  Availability:  Commercially and for research 4.  Volatility:  Non-persistent (rapidly disperses after release, only poses shortduration hazards—hours) 5.  Vapor density:  Heavier than air; it will settle into low places 6.  Odor:  Victims may mention a specific odor (i.e., newly mown hay), but this is not always the case 7.  Routes of entry:  Inhalation 8.  General signs and/or symptoms:  Primarily attacks the airway and lungs, causing irritation of the entire airway from the nose to the lungs. Fluid fills the lungs and pulmonary edema occurs, also known as dryland drowning. The onset of symptoms usually occurs immediately.
63
Chemical Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual WAR-160)
Blood Agents (Cyanides) 1.  Type:  Hydrogen Cyanide (AC) and Cyanogen Chloride (CK) 2.  Dissemination:  Liquid or gas 3.  Availability:  Commercially used in various manufacturing processes, such as electroplating, metallurgy, metal cleaning, and photography 4.  Volatility:  Non-persistent (rapidly disperses after release, only poses immediate, short-duration hazards—hours) 5.  Vapor density:  Range from slightly lighter than air to significantly heavier than air 6.  Odor:  Bitter almonds (peach pits) 7.  Routes of entry:  Inhalation 8.  General signs and/or symptoms:  Gasping for air, frothing or vomiting, losing consciousness, and dying; onset of symptoms occurs very rapidly, within seconds
64
Blister Agents (From the American Board for Certification in Homeland Security)
65
Blister Agents
Mustard: Skin blisters break, leaving large open wounds; however, additional blisters are not created from the fluid of broken blisters. The physiological action of mustard agent produces extreme irritation of the eyes, respiratory tract, and skin. Reports from Iran and Iraq during their war in the 1980s are of horrible, painful deaths due to lung damage. Sulfur Mustard: 1.  Odor: Sulfur mustard has an odor reminiscent of garlic. 2.  Signs and symptoms: Exposure may result in conjunctivitis, a reddening of the skin followed by the formation of blisters (normally within six to twelve hours), inflammation of the nose and throat, and a raspy cough with severe damage to the lungs. 3.  Protection: Sulfur mustard requires both respiratory protection and protective clothing. The mask will protect not only the respiratory tract but also the eyes and face, and protective clothing will protect the remainder of the body. This agent is absorbed by most clothing, which will then off gas. 4.  Decontamination: First aid involves removing all liquid agent from the skin immediately. Decontamination requires pinching or blotting agent off the skin rather than rubbing or wiping. After agent removal, flush with copious amounts of water. While any water is better than no water, best results for agent removal involves using high volumes of water with low-pressure. 66
Chemical Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Blister Agents 1.  Type: Mustards (H) (also referred to as mustard agents), Lewisite (L), Phosgene Oxime (CX); of this group Mustard (H) is most likely to be used as it is the easiest to produce 2.  Dissemination: Liquid 3.  Availability: Not commercially available; however some countries have military stockpiles 4.  Volatility: Most are relatively persistent, agent (either in vapor or liquid form) poses a contact or inhalational threat by being slow to evaporate 5.  Vapor density: Heavier than air 6.  Odor: Onions, garlic, horseradish (Mustard), or geraniums (Lewisite); intense and irritating (Phosgene Oxime) 7.  Routes of entry: Inhalation, ingestion, or absorption
67
Chemical Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Blister Agents (continued) 8.  General signs and/or symptoms: Mustard agent exposure (no effects for hours), Lewisite and Phosgene Oxime produce pain (effect seen immediately)
Severe itching and blisters, tearing/inflammatory reactions begin to appear immediately or up to several hours after exposure, causing pain, extreme light sensitivity, and spasmodic winking, bloody diarrhea, nausea, vomiting, and extreme weakness, nasal secretions, hoarseness, progressive coughing, loss of voice, and difficult breathing. Gastrointestinal effects result in the destruction of mucus membranes. Shock is possible.
Onset of symptoms may not appear for hours with Mustard agents, but with other blister agents symptoms will occur immediately.
68
Chemical Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Nerve Agents 1.  Type: Tabun (GA), Sarin (GB), Soman (GD), and (VX) 2.  Dissemination: Liquid or gas 3.  Availability: Not commercially available; some countries have military stockpiles 4.  Volatility: Tabun, Sarin, and Soman are nonpersistent (rapidly disperses after release, only poses immediate, short-duration hazard—hours) 5.  Volatility: VX is persistent (agent poses a contact or inhalational threat by being slow to evaporate) 6.  Vapor density: Heavier than air 7.  Odor: Slightly fruity (Tabun), faintly sweet (Sarin), Camphor (Soman), odorless (VX) 8.  Routes of entry: Inhalation or absorption
69
Chemical Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Nerve Agents (continued) 9.  General signs and/or symptoms: Pinpointed pupils, respiratory arrest, sweating, weakness, disorientation, diarrhea, slurred speech, nausea/vomiting/drooling, trembling, paralysis, depression, abdominal pain, respiratory failure/depression, vomiting, headache, reduced vision, convulsions, general increase in secretions, tremors 10.  Onset of symptoms: occurs immediately. Some of these symptoms are known by the acronym SLUDGEM Salivation Lacrimation Urination Defecation Gastric distress Emesis Miosis
70
Chemicals Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Relative/Approximate Lethality in Relation to Chlorine
Since chlorine is readily (i.e., commercially) available, it is frequently used as a baseline for determining lethality in relation to other chemical agents.
•  Cyanogen Chloride is twice as toxic •  Phosgene is six times more toxic •  Hydrogen Cyanide is seven times more toxic •  Mustard thirteen times more toxic •  Sarin is two hundred times more toxic •  VX is six hundred times more toxic
NOTE: For skin toxicity, one to two grams of Mustard or Sarin or ten milligrams of VX are required. Skin toxicity for VX requires a quantity that is one hundred to two hundred times less than either Mustard or Sarin. 71
Chemical Agents Used as WMD   Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Avoid—Isolate—Notify 1.  Avoid Use the principles of time, distance, and shielding to avoid chemical agents. Time: Minimize the time spent in the affected area. Evacuate the immediate area as soon as the presence of a chemical hazard is detected. Get out and stay out until the all clear signal is given. Distance: Maximize the distance from the contaminated materials. The further one is from the hazard, the less likely the hazard will have an effect on life and mission capability. Evacuate upwind, uphill, and upstream to a distance specified in the ERG or Emergency Response Guidebook depending upon the chemical agent present. Shielding: Use shielding whenever it is necessary to reduce/eliminate exposure. By placing an appropriate shield between the contaminant source and the individual (such as sheltering-in-place), some contamination and exposure may be completely eliminated or reduced to an acceptable level.
72
Chemical Agents Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
2.  Isolate To prevent the spread of chemical agents, individuals should use standard control zones during a WMD incident. Control Zones: The designation of areas at the hazardous materials incident based on safety and the degree of hazard. Hot Zone: Area immediately surrounding a hazardous materials incident, which extends far enough to prevent adverse effects from hazardous materials released to personnel outside the zone; also referred to as the exclusion or restricted zone. Warm Zone: Area where personnel, equipment decontamination, and hot zone support takes place. It includes control points for the access corridor, and thus assists in reducing the spread of contamination. It is also referred to as the decontamination, contamination reduction, or limited access corridor. Cold Zone: Includes command post and other support functions deemed necessary to control the incident.
73
Chemical Agents Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
3.  Notify Follow local protocols for notifying emergency services and emergency support personnel. •  What happened •  Where it happened •  When it happened •  Special hazards associated with the event •  Indicators of the type of hazard, the number of victims, and any witnesses •  Any protective measures taken •  Facilities and locations affected
74
Important Concepts Regarding Chemical Agents (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  Blister agents are normally disseminated as a liquid.
•  Hydrogen Cyanide (AC) is an example of a blood agent.
•  Exposure to chemical agents and toxic industrial chemicals and materials creates certain distance types of signs and symptoms in human beings.
•  Signs and symptoms exhibited by humans when exposed to chemical agents and/or toxic industrial chemicals and materials, fall into the categories of skin irritation such as rashes or blistering, nervous system problems, and difficulty breathing or catching one’s breath.
75
Important Concepts Regarding Chemical Agents (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  Chocking agents are chemical agents that primarily attack the airways and lungs, causing irritations of the entire airway from the nose to the lungs resulting in what is commonly known as dry-land drowning.
•  A person exposed to a chemical nerve agent manifests symptoms of weakness, excessive sweating, drooling, tearing, and pinpointed pupils.
76
Lesson Three Review
As a result of having completed Lesson Three you should be able to answer the following questions:
1.  VX is how many times more toxic than chlorine?
2.  What are the two types of chemical agents?
3.  What chemical is readily (i.e., commercially) available and is frequently used as a baseline for determining lethality in relationship to other chemical agents?
4.  Mustard gas smells like what three vegetables?
5.  Chemical incidents are characterized by (name all identifying characteristics)?
77
LESSON FOUR
Biological Agents Used as CBRNE WMD
78
Biological Warfare Agents (From the American Board for Certification in Homeland Security)
79
Introduction to Biological Warfare Agents
This lesson addresses biological agents. You will see some similarities to chemical agents with some significant differences. This lesson identifies some of the basic characteristics of these potential biological agents and give ways to protect yourself against a biological attack. Biological Warfare (BW) agents are those biological materials that were considered for use on the battlefield. For the purposes of this course, the terms “biological agents” and “biological warfare agents” will be used interchangeably.
80
Introduction to Biological Warfare Agents
Biological Warfare Agents 1. Delayed effects: Unlike chemical agents, most of which have an immediate effect, most biological agents have a delayed effect ranging from several hours to days and in some cases weeks. In the event of a biological incident, there may be no casualties and nothing significant initially. You or someone else may happen to witness the actual release or find some type of suspected dissemination device or you may receive intelligence from law enforcement that alerts you to the possibility of the attack. 2. Toxicity: By weight, biological agents are generally more toxic than chemical agents. For example, ricin—one of the toxins to be mentioned—is 6 to 9 times more toxic than sarin, and botulinum—another toxin—is 15,000 to 30,000 times more toxic than sarin. 3. Human detection: Biological agents are undetectable by the human senses. We cannot see or smell them nor should we attempt to touch or taste them.
81
Biological Agents Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  Biological attacks may mimic naturally occurring diseases; this may make it difficult to determine if the occurrence is a terrorist incident.
•  The first clues to a biological attack may be:
–  Large numbers of patients with the same illness within a few days
–  Previously healthy persons suddenly becoming ill
–  The occurrence of an unusual disease for a region
–  The appearance of an illness considered out-of-season or thought to be eradicated
–  A large number of sick or dead animals
82
Biological Agents Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Biological Agents General Information
1.  Type: All biological classifications 2.  Dissemination: Solid, aerosol, person to person, object to a person, or liquid 3.  Availability: Commercially or natural setting 4.  Mechanical routes of entry (mechanism of entry): Several into the body •  Inhalation (gases or aerosols) •  Ingestion (residue eaten) •  Contact (with agent, infected person, or contaminated object) •  Injection (in the skin) 5.  General signs and/or symptoms: •  Sign = presence of a disease •  Symptom = change from normal function, sensation, or appearance 6. Mortality: Potential for death resulting from biological agent/event 7. Basic treatment: General medical treatment for identified biological agent
83
Routes of Entry (From the American Board for Certification in Homeland Security)
Eyes
Respiratory Tract
Skin
Ingestion
Injection
84
Routes of Entry
Routes of entry describe how an agent gets into the body. 1. Respiratory tract: Most agents are disseminated as aerosols or gases and enter the body through the respiratory tract. 2. Skin: Some liquid agents enter via skin contact. In some instances, if the vapor concentration is high enough or if the vapor exposure is long enough, vapors can penetrate the skin and cause the same effects as skin contact with a liquid agent. However, the concentrations required are sufficiently large that this is not generally a lethal skin hazard particularly in large or open areas. 3. Eyes: Because the eyes are especially sensitive to a number of agents, they may often give an early sign of exposure. 4. Ingestion: Some agents may enter the body by ingestion of contaminated food or liquid. 5. Injection: In two known instances, assassins have injected chemical agents into their victims.
85
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Biological weapons take the form of disease-causing organisms or toxins produced by living organisms, because they are naturally occurring/living organisms in nature.
They can be categorized into three groups: •  Bacteria •  Viruses •  Toxins
86
Bacteria (From the American Board for Certification in Homeland Security)
87
Bacteria
Anthrax and plague are two examples of diseases caused by bacteria:
Anthrax: Incubation period: The incubation period is one to six days. Early symptoms are chills, fever, nausea, and swelling of lymph nodes. Treatment involves the use of antibiotics, vaccine, and treating the specific symptoms. Once symptoms of the disease develop, treatment is supportive and often unsuccessful. Contagious: No. Anthrax is a bacteria. It occurs naturally in cattle, sheep, and other hoofed animals. It is normally transmitted to man through cuts or abrasions in the arms and hands (coetaneous anthrax). Anthrax can form spores which make the organism more resilient. In spore form it can be transmitted to man through the respiratory tract (inhalational anthrax), where it is a much greater threat (mortality can reach 80 to 90 percent). Protection: The use of standard precautions is necessary for handling victims of this agent.
88
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Bacteria
Anthrax: Primarily a disease of animals. It resides in soil and can create spores under certain environmental conditions. 1.  Type: Bacillus anthraces 2.  Dissemination: Solid 3.  Availability: Naturally occurring; widespread usage in labs throughout the United States 4.  Routes of entry: Inhalation, ingestion, contact or injection. Humans can become infected with anthrax by handling products from infected animals or by breathing in anthrax spores from infected animal products (like wool for example). The most deadly form of anthrax is inhalation. People can also become infected with gastrointestinal anthrax by eating undercooked meat from infected animals. Not transmittable through human contact with the exception of cutaneous anthrax, which is similar to a blood-borne pathogen. 89
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Bacteria
Anthrax (continued): 5.  General signs and/or symptoms: Early symptoms are flulike—chills, fever, nausea, and swelling of lymph nodes. Other signs and symptoms include coughing, fever, malaise, fatigue, and mild chest discomfort. 6.  Mortality: Early treatment of cutaneous anthrax is usually curative, and early treatment of all forms is important for recovery (20 percent with antibiotic treatment and less than 1 percent without antibiotic treatment).
Fatality for inhalation anthrax is 75 percent even with use of appropriate antibiotics. Fatality rate for gastrointestinal anthrax is between 25 percent and 60 percent.
90
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Bacteria
Anthrax (continued):
7.  Basic treatment: Appropriate antibiotics such ciprofloxacin, doxycycline, or penicillin for pulmonary and intestinal infections may be useful in the very early stages for the biological agent identified. Treatment for individuals exposed but do not present symptoms should continue for sixty days after exposure. Intensive care may be necessary for advanced infections.
A Food and Drug Administration (FDA) licensed vaccine is available. The vaccine schedule is 0.5 ml administered subcutaneously at zero, two, and four weeks, then six, twelve, and eighteen months for the primary series, followed by annual boosters.
91
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Bacteria
Plague (Plāg): 1.  Type: Bacteria (Causative bacterium = Yersinia pestis) •  Bubonic plague* •  Pneumonic plague* •  Septicemic plague 2.  Dissemination: Aerosol 3.  Availability: Naturally occurring; widespread usage in labs in the United States 4.  Routes of entry: Inhalation, ingestion, or injection; transmissible to humans through the respiratory tract, causing pneumonic plague
*NOTE: Bubonic plague is NOT transmissible through human contact. Pneumonic Plague IS transmissible through human contact.
92
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Bacteria
Plague (continued): 5. General signs and/or symptoms: Pneumonic plague incubates two to three days; high fever, chills, headache, hemoptysis, and toxemia, progressing rapidly to dyspnea, strider, and cyanosis. Death occurs from respiratory failure, circulatory collapse, and a bleeding diathesis. Bubonic plague incubates in two to ten days. Symptoms include malaise, high fever, and tender lymph nodes. It may progress spontaneously to the septicemic form and spread to the lungs
93
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manuel AWR-160)
Bacteria
Plague (continued):
6.  Mortality: Without early treatment, patients may die—about 14 percent (one in seven) of all plague cases in the United States are fatal. 7.  Basic Treatment: Early treatment of pneumonic plague is essential. To reduce the chance of death, antibiotics must be given within twenty-four hours of the first symptoms. Streptomycin is the antibiotic of choice. Antibiotic treatment for seven days will protect people who have had direct, close contact with infected patients.
94
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Bacteria
Tularemia: 1.  Type: Bacteria (Causative bacterium = Francisella tularensis) 2.  Dissemination: Solid or aerosol 3.  Availability: Naturally occurring; widespread usage in labs in the United States 4.  Routes of entry: Inhalation, contact, ingestion, or injection; not transmissible through human contact People can get tularemia by being bitten by an infected tick, deerfly (or other insect), handling infected animal carcasses, eating or drinking contaminated food/water, or breathing in the bacteria (francisella tularenisis).
95
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Bacteria
Tularemia (continued): 5.  General signs and/or symptoms: Sudden fever, chills, headaches, muscle aches, joint pain, dry cough, progressive weakness, and pneumonia. Symptoms usually appear three to five days after exposure to the bacteria but can take as long as fourteen days. 6.  Mortality: Greatly under-recognized and under-reported—less than 200 in the 1990s with 1,409 cases and 20 deaths in the United States between 1985 and 1992. Case fatality rate is 1.4 percent. Currently fatality rates are low, about 1.5 percent. With early detection and treatment death rates are reduced.
96
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Bacteria
Tularemia (continued):
7.  Basic treatment: Early antibiotic treatment is recommended whenever it is likely a person was exposed to tularemia or has been diagnosed as being infected with tularemia. Several types of antibiotics have been effective in treating tularemia infections. The tetracycline class or fluoroquinolone class of antibiotics are taken orally. Streptomycin or gentamicin are also effective against tularemia and are given by injection into a muscle or vein.
97
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Virus •  Viral agents (viruses) are smaller than bacteria, and they need a host person to replicate and spread.
•  Viral agents are not responsive to most, if not all antibiotics. •  The most effective tool for the prevention of viral agents is a vaccination.
98
Smallpox (From the American Board for Certification in Homeland Security)
99
Smallpox (From the American Board for Certification in Homeland Security)
Whereas chicken pox, causes a rash that begins on the trunk and spreads outwards, smallpox begins on the extremities and spreads inward. Skin lesions appear such as those shown in the picture on the previous slide. Following the period of pustular vesicles, the skin lesions dry to form scabs within the next eight to ten days.
Smallpox Case Study 1: • The French and Indian War was fought in North America between France and England during the period of 1754-1767 A.D. Both sides relied heavily on the support of Indian allies. • The English attacked Fort Carillon twice and were repulsed with heavy losses. An English general, Sir Jeffery Amherst, surreptitiously provided the Indians loyal to the French with blankets infected with smallpox virus. • The resulting epidemic decimated the Indians. Shortly thereafter, General Amherst successfully attacked Fort Carillon and renamed it Fort Ticonderoga.
100
Smallpox (From the American Board for Certification in Homeland Security)
Smallpox Case Study 2: The following case study depicts the course of a case of smallpox. •  In May 1963, a 24-year-old seaman on vacation left Australia on a flight to Sweden that made stops for no longer than fifty minutes in Djakarta, Singapore, Rangoon, Calcutta, Karach, Teheran, and Damascus en route to Zurich. •  In Zurich, the seaman deplaned and the following day boarded a flight to Sweden. •  Approximately 15 days later, he developed fever and a mild rash (consistent with smallpox). •  The seaman was diagnosed with smallpox, which he apparently acquired as a result of in-transit exposure at a terminal or on a plane. •  A total of nineteen cases were identified in the outbreak. •  More than 300,000 people were vaccinated.
101
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Virus Smallpox:
1.  Type: Virus (Causative virus = Variola virus) 2.  Dissemination: Aerosol, person to person, or object to person (most common transmission method is through a large droplet of nuclei, such as sneezing) 5.  Availability: No longer naturally occurring; only known authorized sources are laboratories in Atlanta and Moscow 6.  Routes of entry: Inhalation—the virus must pass from person to person in a continuing chain of infection and is spread by inhalation of droplets or aerosols. Smallpox spreads most readily during the cool, dry winter months, but can be transmitted in any climate and in any part of the world.
102
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Virus Smallpox (continued):
5.  General signs and/or symptoms: During the first two to three days of illness, smallpox causes symptoms that affect the whole body, including: high fever, often rising to more than 104 °F (40 °C), then dropping over two to three days; extreme lethargy, severe headache, severe backache, severe abdominal pain and vomiting. The incubation period is seventeen days, however symptoms can develop as soon as seven days after exposure. May sometimes be confused with chicken pox but differs in signs and symptoms. Any outbreak of smallpox would be considered a major health threat and a terrorist incident.
103
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Virus
Smallpox (continued): 6.  Mortality: The majority of patients with smallpox recover, but death may occur in up to 30 percent of cases. Many smallpox survivors have permanent scars over large areas of their bodies especially on the face; some are left blind. 7.  Basic treatment: May be prevented through use of the smallpox vaccine. There is no proven treatment or cure for smallpox. Early test results show that the drug Cidofovir may fight the virus. Some patients can benefit somewhat from supportive therapy which involves making the patient as comfortable as possible before they die. Medical personnel may use intravenous fluids, medication to control fever or pain, and antibiotics for any secondary bacterial infections that may occur.
104
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Virus Venezuelan Equine Encephalomyelitis (VEE): 1.  Type: Virus (Causative virus = VEE) 2.  Dissemination: Solid, liquid, or aerosol 3.  Availability: Naturally occurring; widespread usage in labs in the United States 4.  Routes of entry: Inhalation and injection (not transmittable through human contact) 5.  General signs and/or symptoms: Incubation period of one to five days; symptoms include fever, severe headaches, malaise, extreme soreness in the legs and lower back area; nausea, vomiting, cough, sore throat, and diarrhea may follow.
105
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Virus
Venezuelan Equine Encephalomyelitis (VEE): 6.  Mortality: The overall mortality rate from epidemics is 0.5 percent to 1 percent. The mortality rate is in the range of 20 percent. 7.  Basic treatment: Symptomatic and in a hospital emergency room; involves correcting fluid deficiencies No specific medications are approved. Patients should be admitted to a hospital for observation and progression of the virus. They are monitored by infections disease specialists on staff and kept in an infectious disease ward.
106
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Virus Viral Hemorrhagic Fevers (VHF): 1.  Type: Virus (Causative virus = VHF) 2.  Dissemination: Solid, liquid, or aerosol 3.  Availability: Naturally occurring; widespread usage in labs in the United States 4.  Routes of entry: Contact, inhalation, ingestion, or injection 5.  General signs and/or symptoms: Vary by type of VHF, but often initially include marked fever, fatigue, dizziness, muscle aches, loss of strength, and exhaustion. Patients with severe cases often show signs of bleeding under the skin, in internal organs, or from body orifices (i.e., mouth, eyes, or ears) but rarely die due to blood loss. The severely ill may show signs of shock, nervous system malfunction, coma, delirium, and seizures. Some types of VHF are associated with renal failure. 107
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Virus Viral Hemorrhagic Fevers (continued): 6.  Mortality: Varies from less the 10 percent to approximately 90 percent, depending on the type of VHF Complications include retinitis, orchitis, hepatitis, transverse myelitis, and uveitis. Patients who recover from Lassa fever infection, deafness is the most common complication. Spontaneous abortion is common. Renal insufficiency is associated with Hemorrhagic Fever with Renal Syndrome (HFRS) infection.
108
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Virus
Viral Hemorrhagic Fevers (continued): 7.  Basic Treatment: While patients receive support therapy, with few exceptions, there is no cure or established drug treatment for VHF. Several drugs are currently undergoing testing and evaluation, because they have been successful in limited instances with cases involving: •  Lassa Fever •  Hemorrhagic Fever with Renal Syndrome (HFRS) •  Argentine Hemorrhagic Fever
109
Toxins (From the American Board for Certification in Homeland Security)
110
Toxins (From the American Board for Certification in Homeland Security)
There are numerous naturally occurring toxins. For the purposes of this lesson, they will be grouped into two categories: 1. Neurotoxins: Neurotoxins attack the nervous system. They are fairly fast-acting and can act in a manner opposite to that of the nerve agents because they prevent nerve-tomuscle stimulation. 2. Cytotoxins: Cytotoxins are cell poisons. They are slower acting and can have a variety of symptoms, including vomiting, diarrhea, rashes, blisters, jaundice, bleeding, or general tissue deterioration. There are numerous other modes of action of toxins, which are beyond our need to discuss here.
111
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual WAR-160)
•  Toxins are harmful biological products made by living organisms (bacteria, plants, and animals).
•  Toxins function much like chemical agents, but they are more potent than most manmade chemical agents.
•  Toxins are not contagious.
Toxin Ricin: 1.  Type: Ricinus communis (Ricin) 2.  Dissemination: Solid, liquid, or aerosol 3.  Availability: Commercially available; naturally occurring
112
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Toxin
Ricinus Communis (continued): 4.  Routes of entry: Inhalation, ingestion, or injection 5.  General signs and/or symptoms: Will vary, but may include the following: •  generalized weakness •  dizziness •  dry mouth •  dry throat •  blurred vision •  respiratory failure The onset of symptoms is one to twelve hours. Low blood pressure and respiratory failure may occur, leading to death.
113
Biological Agents Used as WMD by Type (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Toxin
Ricinus Communis (continued): 6.  Mortality: Death could take place in seventy-two hours of exposure, depending on the route of exposure and the dose received. If death has not occurred in three to five days, the victim usually recovers. 7.  Basic treatment: No antidote exists for ricin. Treatment consists of giving patient supportive care and depends on route of entry. •  Assist breathing •  IV fluids •  Flush stomach •  Seizure and low blood pressure medication •  Irrigate eyes if irritated
114
Biological Agents Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Avoid—Isolate—Notify
1. Avoid The principles of time, distance, and shielding also apply to avoiding biological agents. •  Information is the key to avoiding biological agents. •  Although difficult, early detection of biological agents is essential and may involve tracking patients with unusual symptoms. •  Additional protective measures to avoid biological agents include: –  Immunization –  Medicating those at risk and those exposed before illness occurs.
115
Biological Agents Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) 1.  Avoid (continued) Proper self-protection from biological WMD The first line of defense: •  Air-Purifying (APR) with High Efficiency Particulate Air (HEPA) filters •  Self-Contained Breathing Apparatus (SCBA) •  Combined with clothing and unbroken skin •  Use good sanitation measures •  Eat and drink nothing in the immediate area of the Incident •  Touch nothing if possible •  Wash hands with soap and water or alcohol-based hand sanitizers
116
Biological Agents Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) 1.  Avoid (continued) Contamination requires decontamination. The first line of defense: •  Individuals should observe blood-borne pathogen universal precautions as the first line of protection and defense. •  If flu-like or other symptoms appear, seek medical attention immediately. •  If suspicious of contamination, do not wait for the presentation of symptoms; seek medical attention immediately.
117
Biological Agents Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
2.  Isolate To prevent the spread of biological agents, individuals should use standard control zones during a WMD incident. Control Zones: The designation of areas at the hazardous materials incident based on safety and the degree of hazard. Hot Zone: Most often, there will be no identifiable hot zone when isolating biological agents. Warm Zone: Area where personnel, equipment decontamination, and hot zone support takes place, including control points (also called decontamination, contamination reduction, or limited access corridor). Cold Zone: Includes command post and other support functions deemed necessary to control the incident.
118
Biological Agents Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) 2.  Isolate (continued) •  Patient with disease may need to be isolated to prevent further spread of illness. •  Well persons exposed to a biological agent may need to be quarantined until it can be determined whether they have acquired the disease. •  If contamination of property has occurred in a biological agent attack, it will have to be remediated and personnel protected until the hazards have been neutralized.
119
Biological Agents Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
3.  Notify •  Biological agents as terrorist weapons differ from other WMD events in that: –  Not all affected individuals will be present for care at the same time or place –  Effective management and response involves a close relationship with public health, clinical personnel, and other responders •  Follow local protocols for notifying emergency services and emergency support personnel: –  What happened –  Where it happened –  When it happened –  Special hazards associated with the event –  Any protective measures taken –  Facilities and locations affected
120
Advantages of Using Biological Agents as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
1.  Availability: From nature, hospital labs, and university research facilities
2.  Hard to detect: Small quantities have tremendous effect
3.  Used covertly: Can be spread throughout large areas by nature
4.  Easily spread: Ventilation systems, person to person
5.  Tie up resources: Long-lasting latency (years), time consuming decontamination
6.  Psychological impact: Causes terror reaction in people
7.  Difficult to prepare for: Reactive vs. proactive response only
121
Disadvantages of Using Biological Agents as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) 1.  Delayed effects (can detract from the intended impact, many times terrorists want immediate effect and satisfaction) 2.  Production of biological agents and devices is hazardous to the terrorist (need HAZMAT PPE to reduce exposure to terrorist) 3.  Development of effective biological weapons requires numerous difficult steps (minimum sixteen steps) 4.  Outdoor releases may be hampered by wind, rain, or other environmental factors; may even degrade effectiveness of release 5.  Less predictable result with respect to the target population than with other terrorist devices (i.e., explosions)
122
Important Concepts Regarding Biological Agents (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  Biological agents are available from nature. They are easy to hide and spread and hard to detect. •  Bacteria, viruses, and toxins are the three categories or groups of biological weapons that take the form of disease-causing organisms. •  Due to the extensive medial infrastructure in the United States, medical and public health officials will generally be the first group to detect a biological attack. •  Biological attacks will generally go unnoticed for a period of time. •  Toxins are a nonliving substance produced by living plants and animals that may be used as biological agents.
123
Lesson Four Review
As a result of having completed Lesson Four you should be able to answer the following questions:
1.  What are the first clues to a biological attack (list all)?
2.  Viral agents are not responsive to most, if not all ______________.
3.  Any outbreak of smallpox would be considered a major health threat and a _____________ ______________ .
4.  Explain/define the term supportive care.
124
LESSON FIVE
Radiological Materials and Nuclear Weapons Used as CBRNE WMD
125
Nuclear/Radiological Materials (From the American Board for Certification in Homeland Security)
126
Introduction to Nuclear/Radiological Materials (From the American Board for Certification in Homeland Security)
Of the three types of threats—chemical, biological, or nuclear/radiological—a nuclear weapon explosion is considered the least likely for terrorist use. However, the potential exists for it to happen, and even more potential exists for the use of radiological materials. • The detonation of an improvised nuclear device (IND) would be devastating. If successfully detonated, this would cause widespread explosive damage with a large release of radioactive particles. • A terrorist attack on a nuclear power plant could lead to a radiation accident. Look at Three-mile Island and Chernobyl as examples of the possible scenario events.
127
Introduction to Nuclear/Radiological Materials (From the American Board for Certification in Homeland Security)
•  The use of radiological materials to contaminate an area through the use of a Radiological Dispersal Device (RDD), or the simple act of spreading the materials, is more likely than terrorist sabotage of a nuclear reactor or construction of a nuclear device. •  An RDD is an explosive device that does not cause a nuclear reaction, but is designed to spread radioactive materials upon detonation. For example, in the case of the Greensboro, North Carolina, theft of Cesium-137, there is concern that this radiological material may be used to create a dirty bomb. •  A Simple Radiological Device (SRD) can be used to deliberately cause exposure to radioactive material without the use of an explosive device. This has been seen in the last few years in the form of hoaxes and actual plans.
128
Radiation (From the American Board for Certification in Homeland Security)
•  Alpha particles
•  Beta particles
•  Gamma rays
•  Neutrons
++
129
Ionizing Radiation (From the American Board for Certification in Homeland Security)
•  When ionizing radiation is absorbed by our bodies, it can cause changes to our cells. Small amounts can be tolerated; larger amounts can be harmful. •  For the purposes of this lesson radiation can be classified as: –  Alpha particles: Alpha particles are emitted from the nucleus of an atom and consist of 2 protons and 2 neutrons. They have a positive charge, limited range, and penetrating power. When an alpha particle is emitted from an atom, the releasing atom is changed. The atomic number decreases by 2 and the atomic weight decreases by 4. This “new” atom is normally radioactive. –  Beta particles: Beta particles are also emitted from the nucleus of an atom. They are similar to the electrons which orbit the nucleus, have a negative charge, and depending on their energy, may have greater range and penetrating power than alpha particles. Atoms that emit beta particles also change, with their atomic numbers increasing by 1 and their atomic weights remaining the same. In the most basic of theories, a neutron breaks down, ejects an electron, and leaves one more proton in the nucleus.
130
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Recognizing Radioactive Materials General Information •  Radiation is the invisible energy emitted by certain types of unstable or radioactive atoms. •  Energy travels through the air but cannot be seen. •  Some types can penetrate packaging materials, vehicles, and building walls. •  When radiation reaches a person, that person is exposed. •  The amount of radiation energy absorbed by a person is called a dose. •  Small amounts of radiation (low dose or x-ray) has a very low risk of health effects. •  Large amounts of radiation (high dose) have a high risk of health effects.
131
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Radioactive Materials General Information (continued)
•  High risk health effects include nausea, vomiting, diarrhea, burns, and possible death.
•  Terrorists may use radiological material as WMD to injure/kill people or to create fear and panic among the target public.
•  The four types of radiation, also called ionizing radiation, emitted by radioactive material are alpha, beta, gamma, and neutron radiation.
•  Radiation travels from the radioactive material in all directions, including upwind.
•  The distance it can travel ranges from a quarter inch to hundreds of feet, depending on the specific type of radioactive material.
132
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160 and http://www.caslab.com/ERG/Guide-163.php) Recognizing Radioactive Materials General Information (continued)
•  The farther the radiation travels, the weaker (and less hazardous) it becomes.
•  The Emergency Response Guidebook (ERG 163) recommends isolating a spill, leak, or damaged container of radiological material for at least twenty-five meters (75 feet) in all directions.
•  Radioactive material may be a solid, liquid, or gas.
•  Many of the types of radioactive material released into the pubic by terrorists may be in the form of dust or powder.
•  Radioactive material is not considered to be a contamination until it is released from its container.
133
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Radioactive Materials General Information (continued)
•  Radioactive contamination is radioactive material in an unwanted place, particularly where its presence may be harmful.
•  Some types of contamination may be readily spread from one surface to another. Some contamination may be suspended in the air.
•  In a deliberate release of radioactive material by terrorists, this contamination may be in the form of radioactive dust (ceramic or powder).
NOTE: Even if used as a terrorist weapon, most of the radioactive sources (devices or items with radioactive material) in the U.S. do not meet the definition of a WMD, as defined in Title 18 U.S.C. 2332(a), because they do not release radiation or radioactivity at a level dangerous to human life.
134
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Radioactive Materials General Information (continued)
Radioactive sources that can be life-endangering may be found •  At hospitals and cancer treatment facilities •  On industrial and construction sites •  At nuclear power plants •  In transit
135
Health Hazards in an Incident (From the American Board for Certification in Homeland Security)
•  Exposure to radiation source (external) •  Contamination (possible internal and/or external)
External Contamination
Internal Contamination
Source
Exposure
136
Health Hazards in an Incident (From the American Board for Certification in Homeland Security)
•  The two radiation concerns at an incident are exposure and contamination by radioactive material. –  External irradiation occurs when all or part of the body is exposed to penetrating radiation from an external source. –  Contamination means that radioactive materials in the form of gases, liquids, or solids are released into the environment and get on people externally, get in people, or both.
•  Incidents involving either an explosion or fire will elevate the potential for internal or external contamination due to the spreading of the radioactive material in the form of small fragments (dust) or smoke. These materials can often be carried long distances downwind.
NOTE: Internal exposure through wounds or broken skin is also possible. Responders should take extra precautions when sharp objects such as broken glass or jagged metal are at the scene.
137
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Exposure vs. Contamination
•  External Exposure: The radiation, but not the radioactive material, reaches the person. The source of radiation (radioactive material) is not on the person and not inside the person, therefore, the person is not contaminated. The person is NOT radioactive. This person does not emit radiation and cannot be a hazard to himself/herself or anybody else around, including medical personnel.
138
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Exposure vs. Contamination (continued)
•  External Contamination: An externally contaminated person has radiological material physically attached to his or her skin and/or hair.
•  External Radiological Material Contamination: Occurs when radiological material physically attaches to an external surface (or person). Everyone and everything near the release of radioactive material must be treated as potentially externally contaminated. This includes victims, responders, equipment, papers, and evidence. An externally contaminated person is receiving an external exposure of radiation as long as the radioactive material remains on the individual.
139
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Exposure vs. Contamination (continued)
•  Internal Contamination and Internal Exposure: Occurs when unprotected people ingest, inhale, or are wounded by radioactive material. Open wounds can be a pathway for internal contamination. The internally contaminated victim may also be externally contaminated. The skin, mouth, and nose are the most obvious routes of internal contamination. In general, internal contamination is more dangerous to the victim than external contamination.
140
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Exposure vs. Contamination (continued)
•  Radioactive Material: Can enter the body by four methods 1.  Inhalation: Gaseous or airborne particles, dust particulates, and matter with radioactive material may enter the body through the lungs. 2.  Ingestion: Internal radioactive contamination may enter the body through the gastrointestinal tract by way of contaminated food, drink, and swallowing contaminated mucous from the nasal area. 3.  Absorption: Radioactive material may be absorbed through the skin or mucous membranes. 4.  Puncture or Injection: Radioactive material can penetrate the body through cuts, wounds, and punctures to the skin.
141
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Recognizing Radioactive Contamination
•  Acute Radiation Syndrome: Victims who receive a large dose of radiation may suffer from Acute Radiation Syndrome (ARS) or radiation sickness. Key symptoms are nausea, vomiting, and diarrhea. Symptoms may not develop for hours after the exposure. If the victims are nauseous and vomiting immediately after the release of a WMD, the cause is probably not radiation exposure. Many other factors can cause nausea, vomiting, and diarrhea. The larger the dose of radiation a victim receives, the quicker the symptoms appear and the more severe the reaction.
142
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Recognizing Radioactive Contamination (continued)
If the dose of radiation is high enough, the victim may die in days to weeks, but proper medical attention may save many victims if the dose is not too high.
Victims and individuals who receive lower doses of radiation may have no symptoms and have only a very small increased risk of developing cancer.
Some victims who receive high doses of radiation have an increased risk of developing cancer, but may not suffer from any of the symptoms of ARS.
There are no proven cases of genetic damage to people, but there is a small risk that it might happen.
Indicator of ARS: victims seem to recover, then symptoms reappear hours to days later, and the symptoms are more severe than ever.
143
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Recognizing Radioactive Contamination (continued)
•  Radiation Burns: Skin exposed to high doses of radiation may turn red and look puffy. Burns may not appear for hours after exposure. Skin may also turn a bronze color similar to a suntan. Lack of radiation burns immediately after a detonation or release of material does not mean the person did not receive a serious dose of radiation and does not mean the person has escaped contamination. Victim with burns appearing immediately after the release of a WMD agent are probably not radiation burns, but more likely thermal or chemical burns.
144
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Recognizing Radioactive Contamination (continued)
Radiation burns are not painful while the damage is occurring. After burns to the skin start to develop, the skin may start to itch and become painful.
Radiation burns may seem to heal then return a day or more later with more severe pain, blistering, and swelling.
In some cases where persons found or stole industrial radioactive sources and taken the containers apart, they suffered burns on their hands.
NOTE: If suspects have burns on their hands, they may have been handling, transporting, or building a Radiological Dispersal Device (RDD).
145
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Radiation Exposure Devices •  Radiation Exposure Device: It may take many different forms, but the energy radiated or transmitted in the form of rays, waves, or particles serves the particular purpose of the terrorist. Terrorists may place a stolen industrial radiation source in a building or public location, irradiating (but not contaminating) individuals in the immediate area every day until the device is discovered or the victims begin to show recognizable symptoms. A radiation exposure device is a radiation source placed to expose victims to high levels of radiation. There are about two million radioactive sources across the United States in hospitals, medical facilities, construction sites, industrial manufacturing facilities, university and research labs, forms of transportation (air, land, and sea), nuclear power plants, and government facilities.
146
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Recognizing Radiation Exposure Devices (continued)
The term radiation exposure device is used to describe a container used to transport radioactive materials. They all show the international symbol for radioactive material in yellow and black colors. Radiation exposure devices are very thick due to the material used as shielding (lead) and weigh much more than their appearance indicates. Their size is dependent upon the amount of radioactive material being transported. They range from small containers that are  six inches in diameter by ten inches in length and weighing forty to eighty pounds  to containers as large as vehicles that weigh several tons.
147
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Radiation Exposure Devices (continued)
Radiation sources often do NOT have the radiation symbol on them.
Therefore, remember any package, container, or backpack that seems to weigh much more than it normally should may contain lead or depleted uranium being used to shield (or block) radiation from a dangerous source.
148
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing a Radiological Dispersal Device (RDD)
•  Radiological Dispersal Device (RDD): A dirty bomb is a conventional explosive or bomb containing radioactive material. The conventional bomb is used as a means to spread radioactive contamination. It is not a nuclear bomb and does not involve a nuclear explosion. Radioactive material is not necessarily nuclear material. Any type of radioactive material could be used in a dirty bomb, but in general, these devices would be unlikely to cause serious health effects beyond those caused by the detonation of conventional explosives, according to the U.S. Nuclear Regulatory Commission. Radioactive material may also be dispersed by methods other than explosives.
149
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing a Radiological Dispersal Device (continued)
An RDD may be as simple as a pipe bomb or explosives attached to a shipping container of radiological material. Because of the wide availability or radiological material throughout the world and the ease of building simple explosives, the probability of the use of an RDD is much higher than that of a nuclear weapon.
150
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing a Radiological Dispersal Device (continued)
The probable effects of a dirty bomb detonation would be: •  Potential for panic in the general public •  Contamination areas near the RDD blast site •  Nonlethal radiation dose levels •  Huge numbers of people thinking that they are contaminated •  A small number of seriously contaminated •  Limited radiation detectors and trained personnel would add to the problem

151
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Nuclear Weapons
•  Nuclear Weapons: The use of a nuclear device by a terrorist would produce devastating effects, including thermal (heat) impulse, blast wave, penetrating neutron and gamma radiation, and radioactive fallout with radiological contamination. It would also have a tremendous psychosocial impact on the community and the entire country. There is a lower probability that terrorists will detonate a nuclear weapon than an RDD. Terrorists may attempt to build a nuclear weapon or attempt to steal or buy one from a nation in possession of them. However, there is no direct evidence that this has taken place or is taking place now.
152
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Nuclear Weapons (continued)
The size of a nuclear explosion may be much larger than conventional explosives.
However, nuclear weapons have been made small enough to be carried by one person. Therefore, a small detonation of less than one kiloton (kt) may be accomplished by a nuclear weapon mistaken for a large truck bomb.
A one kiloton nuclear weapon may destroy buildings in an area less than that of a city block, depending on the size of the city. However, the nuclear fallout would cover a much wider area and contaminate it for perhaps years.
153
Radiological Materials and Nuclear Weapons Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Nuclear Weapons (continued)
A mushroom-shaped cloud would NOT appear with every nuclear explosion.
There will, however, be a smoke column from ground zero and it will usually be light brown (caused by vaporized soil).
There will also be a smoke column from ground zero that will be white (caused by condensed water).
Neither the white or brown smoke columns will be vertical and not spread out like a conventional explosion which is considered horizontal smoke columns.
154
Protection (From the American Board for Certification in Homeland Security)
•  Time
•  Distance
•  Shielding
Alpha Beta Gamma
paper lead
155
Radiological Materials and Nuclear Weapons Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Avoid—Isolate—Notify 1.  Avoid: Use the principles of time, distance, and shielding to avoid radiological materials and nuclear weapons.
Time: Minimize time spent near a radiological source or radioactive contamination. Limit the time near a source of radiation and leave the area as quickly as possible.
The radiation dose is reduced in proportion to reduction of exposure time. The less time exposed to the source of radiation, the lower the dose received.
Get out and stay out of the area until the all clear signal is given.
156
Radiological Materials and Nuclear Weapons Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160 and http://www.caslab.com/ERG/Guide-163.php) 1.  Avoid (continued): Distance: Maximize the distance from a radioactive source or radioactive contamination. Keep as much distance as possible between yourself and the source of radiation. The farther you are away from the source, the lower the dose received. While alpha particles only travel a little over an inch in air, and beta particles will travel only a few yards in air, gamma rays can travel extensive distances. As a result, gamma rays pose the greatest threat of external exposure. Responders will receive a smaller dose of radiation the farther away they are from the source. In the case of gamma rays from an unshielded point source, the intensity increases or decreases in proportion to the square of the distance from the source. Exposure will always be greatly reduced when you move away from radioactive material. If the distance away from the radioactive material is doubled, the radiation dose is reduced by 75 percent. This is true for each doubling of the distance from the source. The ERG recommends at least twenty-five meters (seventy-five feet) from source. 157
Radiological Materials and Nuclear Weapons Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) 1.  Avoid (continued): Shielding: Use shielding when practical. Keep as much protection between yourself and the source as possible. If material can be placed between yourself and the radiation source, you will receive a lower dose. The more heavy, dense materials between you and the source of the radiation the better. Alpha radiation is stopped by a sheet of paper, beta radiation is stopped by aluminum foil or clothing, gamma rays are only reduced by dense materials such as lead or earth, and neutrons are slowed or stopped by hydrogenous materials, such as wax or water. Do not shield neutron producing sources with lead or dense materials. Neutrons will produce gamma rays in reactions with the material. Use wax, water, or plastic. The more dense a material, the greater its ability to stop the passage of radiation. Examples of dense materials are an engine block, mound of dirt, concrete walls, and heavy equipment. However, do not delay emergency procedures to search for shielding materials. 158
Radiological Materials and Nuclear Weapons Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
2.  Isolate: Control Zones: To prevent the spread of radiological materials, individuals should use standard control zones during a WMD incident. The designation of areas or control zones at the hazardous material is based on safety and the degree of hazard and are described as follows: Hot Zone: Area immediately surrounding a hazardous materials incident which extends far enough to prevent adverse effects. Warm Zone: The area where personnel, equipment, decontamination, and hot zone support take place. Cold Zone: Contains the command post and other support functions deemed necessary to control the incident.
159
Radiological Materials and Nuclear Weapons Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
2.  Isolate (continued):
Special Note: Isolate the spill or leak area immediately for at least twenty five meters (seventy-five feet) in all directions.
For large spills (a single large container of more than fifty-five gallons or two hundred liters or multiple smaller containers) consider initial downwind evacuation for at least one hundred meters (330 feet).
When a large quantity of this type of nmaterials is involved in a major fire, consider an initial evacuation distance of three hundred meters (one thousand feet) in all directions.
160
Radiological Materials and Nuclear Weapons Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
3.  Notify: Follow the local protocols to notify emergency services and emergency support personnel. –  What happened –  Where it happened –  When it happened –  Special hazards associated with the event –  Any protective measures taken –  Facilities and locations affected
161
Advantages of Using Radiological Materials as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
1.  Available 2.  Tie up resources 3.  Psychological impact 4.  Difficult to prepare for 5.  Next level of escalation
162
Disadvantages of Using Radiological Materials as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
1.  Heavy containers 2.  Delayed health effects to victims, if any 3.  Theft manufacturing and deployment hazardous to terrorist 4.  Requires numerous difficult steps to make devices likely to cause mass casualties
163
Important Concepts Regarding Radiation (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  Radiation sickness is also known as Acute Radiation Syndrome.
•  Time, distance, and shielding are the three primary techniques for minimizing exposure to radiation and radioactive materials.
•  Alpha, beta, gamma, and neutron are the types of ionizing radiation.
•  A dirty bomb is the most likely radiological device that a terrorist might use in a WMD incident.
•  By limiting the time near a source of radiation and leaving the area as quickly as possible a responder can protect himself/herself from radiation.
164
Important Concepts Regarding Radiation (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  When radiological material physically attaches to an external surface or a person. The phenomena is known as external radiological material contamination.
•  Time is defined as a protective action in as much as personnel should limit the time near a source of radiation and leave the area as quickly as possible.
165
Lesson Five Review
As a result of having completed Lesson Five you should be able to answer the following questions:
1. What are the four types of radiation?
2. Where can life-endangering radioactive sources be found?
3. What is the difference between exposure and contamination?
4. What are the three key symptoms of radioactive contamination?
166
LESSON SIX
Explosive Devices Used as CBRNE WMD
(Unless specifically credited otherwise the source of the material presented in this section is the American Board for Certification in Homeland Security)
167
168
Explosives Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  According to the FBI Bomb Data Center, approximately 70 percent of all terrorist incidents involve the use of explosives and incendiary agents. Because of the prevalence of use, individuals need to understand explosives in order to safely respond to an explosive incident.
169
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Explosive Characteristics
Energetic (explosive) materials can be divided into three categories. 1.  Pyrotechnics: These are produced to create smoke, light, heat, and sound. They are not typically used in terrorist bombings. They are used in other types of bombings and arson. Pyrotechnics includes: fireworks, road flares, smoke grenades, and thermites. 2.  Propellants: These are also referred to as low explosives and designed to provide a controlled release of gas to perform useful work (i.e., push a bullet from a firearm or the space shuttle into space). Propellants are not typically used in homicide bombing attacks. May be used in IED (Improvised Explosive Devices), black or smokeless power, and solid or liquid rocket fuels.
170
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Explosive Characteristics (continued)
3.  Explosives: These are also referred to as high explosives and are designed to yield a near-instantaneous release of energy. A bomb using explosives or high explosives is designed to cause maximum dispersion of shrapnel that is intended to kill and cause property destruction. Examples are TNT, C4, and dynamite.
171
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Explosive Characteristics (continued)
Explosives must be stimulated (or insulted) to detonate (or explode). Stimuli (insults) can occur in six forms: 1.  Heat—Can be in the form of a fire or an atmospheric temperature change 2.  Friction 3.  Impact 4.  Electrostatic Discharge (EDS) 5.  Shock—These insults often cause accidental detonations if an individual inadvertently imparts them into the environment. 6.  Radio Frequency Energy (RFE)—Radio transmissions should be kept at a minimum to lessen the possibility of initiating the explosive device.
172
173
Explosives (from http://www.law.cornell.edu/uscode/uscode18/usc_sec_18_00000921—-000-.html)
•  According to Title 18 U.S.C. Section 921 the definition for explosives is a “bomb, grenade, rocket, missile, or any other device with a charge of more than four ounces.”
174
175
Explosives Classification
•  Low Order—burn rapidly, destroy target by pushing/pulling effects, reaction is propagated through filler material below 3,300 feet per second (fps). •  High Order—reaction through filler at a speed at or above 3,300 fps, destroy target by shattering effect. (Example: ANFO at Oklahoma City, 4,800 pounds of fertilizer and fuel oil)
176
Explosive Devices Used as WMD
Explosives = 70 percent of cases • Effects: Blast Pressure—positive moves away from target due to over-pressurization. Vacuum created negative pressure moves to center at hurricane speed. –  Fragmentation –  Thermal effects –  Ground shock
177
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Categories of High Explosives (HE)
There are three high explosive categories. Each category designates a different level of sensitivity to stimuli—  from primary (being the most sensitive) to tertiary (being the least sensitive).
1.  Primary Explosives: Extremely sensitive and, as a consequence, extremely dangerous. Very small quantities (single granule size) can undergo Deflagration to Detonation Transfer” (DDT) = can cause detonation. Almost all detonators contain primary explosives.
178
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Categories of High Explosives (HE)
2.  Secondary Explosives: Generally far less sensitive than primaries. Made to withstand rough handling. They are the explosive materials more commonly used in bulk (i.e., TNT, C4, and dynamite). Detonating a secondary explosive requires the tremendous energy levels created by another explosion, usually created by a primary explosion found in a blasting cap.
179
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Categories of High Explosives (HE)
3.  Tertiary Explosives: Based on ammonium nitrate (AN), which is a very insensitive substance. Typically require the initiation from a secondary explosive to cause detonation. A blasting cap will not generally initiate them. Usually a large mass (one half range) of the secondary explosive (referred to as a booster) is needed for this purpose, for example a stick of dynamite can be used to initiate a tertiary explosive.
NOTE: These explosives require confinement especially in small quantities (pounds). However, in larger amounts (hundreds of pounds) they provide their own confinement.
180
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosives (IE)
•  Improvised Explosives: Most are comprised of chemical constituents easily found in any home or local community, even in large quantities. Most IE, such as military and commercial explosives, are typically mixtures of an oxidizer and a fuel. Regardless of type all are extremely hazardous. Most IE are based on formulations used in commercial application or research. Legitimate users do not use IE very often. This is due to their sensitivity and unsuitability to be handled in a safe manner. IE can be as effective as manufactured explosives in many applications. Terrorists employ these in all sizes and devices (i.e., Improvised Explosive Devices or IED). However, devices not always conform to definition.
181
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosives (IE)
The following are common types of improvised explosives being used by terrorists today.
Potassium Chlorate: Has 85 percent of the power of TNT, common ingredient in some fireworks and can be purchased in bulk from chemical supply houses. Normally appears in white crystal or powder form.
Peroxide-based IED: An emerging threat domestically, but these have been used by international Terrorists for some time. Developed one hundred years ago. Extremely sensitive. Used by terrorists as both an initiator (blasting cap) and as a major charge. Commonly used as the main charge employed by Middle East terrorists in homicide bombings. Has between 60 to 116 percent of the power of TNT.
182
Explosives Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosives (IE)
Peroxide-based IED (continued):
WARNING: In dry form peroxide-based explosives could appear similar to crack cocaine. They WILL react violently with drug field test kits.
Consider and look for any indicators present on a drug scene that may also be indicators of explosive manufacturing. This is becoming more common.
Consider marking the evidence as a “possible explosives” and send it to the lab for testing.
Peroxide-based explosives are ideal as explosives for improvised blasting caps and were originally developed for such use.
183
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosives (IE)
Powdered Ammonium Nitrate and Aluminum Powder: Can be produced in powdered form (i.e., a common cold pack in either pill or powder form).
If ammonium nitrate is in a pill form such as fertilizer, it is a simple task to grind it up into a powder.
Aluminum powder can be procured at a professional paint store or simply filed from an ingot.
The explosive has 75 percent of the power of TNT and is sensitive to friction impact EDS (Electric Discharge Signal).
It requires only a blasting cap for initiation. A small amount goes a long way.
184
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosives (IE)
Urea Nitrate: Also considered a type of fertilizer-based explosive. The two constituents are nitric acid (one of the ten most produced chemicals in the world) and urea. A common variation is used in South America and the Middle East by terrorists. The explosive mixture can be blasting cap sensitive. Urea nitrate has a destructive power similar to ammonium nitrate.
185
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Preparing Improvised Explosives
•  Commercial coffee grinders are very effective for the process of grinding.
•  Grist mills typically used for the crushing of barley or wheat are also effective. A ton (2,000 pounds) can be processed through one in about two hours.
•  Odd job mixers or even a concrete mixer would be suitable for the mixing of ammonium nitrate and the liquid fuel.
186
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Hypergolic Devices •  Some improvised explosives are hypergolic in nature. •  This means that when two particular chemical constituents are brought together they can violently react with each other, the surrounding atmospheric temperature often being the catalyst.
•  They are highly unstable and unpredictable. •  The reaction will result in either an incendiary effect or an explosion. •  Example: Sulfuric acid (oxidizer) and sugar (fuel) in a Styrofoam cup. The acid slowly eats through the Styrofoam and mixes with the sugar, causing a hypergolic reaction within seconds and resulting in an explosion.
187
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosive Device (IED) Components
All explosive devices (ED generally consist of four components. The acronym used to recall the components is PIES(F). Power source Initiator Explosive Switch F = Fragments/Shrapnel
1.  Power source: The majority of IED contain an electric initiator, and as such, require an electric power source. Batteries are the most common source. They are very reliable in causing an initiator to function. They can be cut and shaped to make detection more difficult. Mechanical action (i.e., spring under pressure) can store sufficient energy to cause the function of a non-electrical initiator. 188
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosive Device (IED) Components (continued)
2.  Initiators: Blasting caps or flame-producing components like fuse igniters for a length-of-time fuse. Can cause low explosives or highly sensitive explosives to detonate. Can be very easily made (i.e., modified flash bulb, percussion primer, or improvised hobby fuses that impart flame).
189
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosive Device (IED) Components (continued)
3.  Explosives: Have previously been discussed, but as an IED, components have a few additional characteristics. When an explosive is incorporated into a device, it is not necessarily in contact with all other IED components. Often these components will survive in some form after a device detonates. Recognize: There is always evidentiary debris at a post blast incident.
190
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosive Device (IED) Components (continued)
4.  Switches: Incorporated into a device as either an arming switch or a fuse. Can be simple or complex. More than one switch can be used to create redundancy in the system. Many IED incorporate both an arming switch and a fusing switch. The arming switch is the safety for the IED and works by disarming (electrically disengaging) the fuse switch. When the arming switch is armed, the fusing switch becomes functional. However, the circuit is still closed.
191
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosive Device (IED) Components
4.  Switches: (continued) When the fusing switch is activated, the circuit becomes open and will connect battery power to the initiator (blasting cap). Detonation will occur. Switches are almost unlimited in design and construction, so any approach or action by its intended target or a first responder will result in detonation. Switches specifically intended for IED application can take on any form or appearance and can appear quite innocent looking—completely fitting into the environment.

192
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Recognizing Improvised Explosive Device (IED) Components (continued)
Fragmentation (and Shrapnel): Although these may or may not technically be categorized as part of an IED, they are the materials added to the device for the purpose of inflicting maximum casualties Examples include ball bearings, nuts, bolts, nails, BBs, pieces of rock, pieces of glass, and even infectious materials.
193
194
Tactics, Techniques, and Procedures for “Armrest” IEDs
•  Easily and quickly moved (portable) •  Remotely detonated (can be wired for manual detonation) •  Can be placed in front seat or back seat •  Can be used as part of a vehicle carried—VCIED •  Can be used as part of a vehicle borne—VBIE •  Can add to explosive effect by placing fuel cans or munitions in vehicle •  Can be used as a stand-alone IED •  Can be placed in various furniture pieces for targeted assassination of key leaders •  Can be placed in an unwitting victim’s vehicle if made to match victim’s armrest
195
196
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) Explosive Incident Response There are three types of explosive incidents individuals may have to deal with and each has its unique response requirements. However, safety is of utmost importance in responding to each type. An individual who becomes injured or killed is no longer a part of the solution but has become part of the problem.
1.  Pre-blast Incidents: Will most likely be reported to dispatch and the first responder will be sent to the scene. Perimeters should be established based on the Bureau of Alcohol, Tobacco, Firearms, and Explosives (BATFE) distance table. After establishing safe perimeter search and evacuation decisions must be made.
197
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Explosive Incident Response (continued)
2.  Post-blast Response: Decisions are based on the destruction caused by the blast. The most important decision is where to establish the first (inner) perimeter or hot zone. The next requirement is to begin victim triage and treatment. Hazards include collapsed building rescues, fire, live electrical lines down, and punctured natural gas lines.
NOTE: It is important not to rush in,but to access the incident before entering the area of the seat of the explosion.

198
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Explosive Incident Response (continued)
3.  Continuing Explosive Incident: This is one of the most difficult types of explosive incidents. It is an incident like that seen in Columbine, Colorado, where active shooters were at a scene with explosive devices present. There were either on-going explosions taking place, or explosive devices set up as booby traps for responders and law enforcement. Incident mitigation is on-going at the same time that rescue operations are being conducted. This differs from post-blast response in the simultaneous (concurrent) nature of mitigation and rescue operations.
199
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Explosive Incident Response (continued)
•  Secondary Devices: Responders should ALWAYS anticipate a secondary device when responding to any of the three types of explosive incidents. Such secondary devices are placed specifically to target individuals because terrorists seek to generate chaos and fear in the civilian population. Secondary devices are specifically used against first responders as a group. Therefore, most of the victims of secondary devices are first responders.
200
Explosive Devices Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Avoid—Isolate—Notify 1.  Avoid: Use the principles of time, distance, and shielding to avoid explosive devices. Time: Minimize the time spent in the affected area. The less time spent in close proximity to a device means less exposure to the device. Once the potential for a device is recognized, quickly evacuate the area.
Get out and stay out until the all clear signal is given!
201
Explosive Devices Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
1.  Avoid (continued): Distance: Maximize the distance from the contaminated (explosive) materials. Exposure is inversely proportional to distance—the greater the distance means less exposure. However, do not increase the distance to the point where the perimeter can not be controlled. If emergency service personnel are dealing with an explosive shipment, distances are delineated in the ERG. In all other cases use the BATFE designated distances.
202
Explosive Devices Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160) 1.  Avoid (continued):
Shielding: Use shielding whenever it is necessary to reduce or eliminate exposure. By placing an appropriate shield between the potential explosive device and an individual, exposure to a potential explosion may be reduced to an acceptable level (i.e., it may produce less serious injuries and or death).
203
Explosive Devices Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
2.  Isolate:
To prevent further harm from explosive devices, individuals should use standard isolation zones during an IED and/or explosive device incident. Control Zones: The designation of areas at the potential explosive device incident are based on safety and the degree of hazard. If emergency personnel are dealing with an explosive shipment, distances are delineated in the ERG. In all other cases use the BATFE designated distances. Never dismiss the possibility of secondary devices.
204
Explosive Devices Used as WMD Rules of Engagement (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
3.  Notify: Follow local protocols for notifying emergency services and emergency support personnel. •  What happened •  Where it happened •  When it happened •  Special hazards associated with the event •  Any protective measures taken •  Facilities and locations affected
205
Explosive Devices Used As WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Evacuations: Evacuate: Responsible officials should make the decision to evacuate only after evaluating the threat. Automatic evacuations or total evacuations of a building or area may lead to additional threats and may affect future events. The next bomb or secondary device may be set up outside in anticipation of the total evacuation. Only consider an evacuation of an entire building or area if the situation dictates.
206
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Evacuations (continued) No Evacuation: When responsible officials make a determination of no evacuation, all personnel in the area may continue with the normal routine. Partial Evacuation: When responsible officials make a determination of a partial evacuation, only essential or needed personnel remain behind to continue operations. Total Evacuation: In total evacuation, all personnel within the building or area are evacuated to a designated safe location.
207
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Safety Considerations for Individuals
•  Pre-blast or Post-blast Conditions: The term pre-blast conditions refers to the affected WMD environment and/or activities prior to a bomb detonating. This may include a host of activities such as building searches, evacuations, and render-safe procedures. The term post-blast conditions refers to the incident environment after a bomb has exploded. This will involve issues dealing with casualties, fire, and structural instability.
208
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Safety Considerations for Individuals (continued)
•  Proximity of Exposures: The distance of exposure from the explosive device will likely influence operational objectives such as evacuations, staging locations, medical treatment area, and perimeter control points.
•  Commitment Level of On-scene Resources: Individuals should prepare for and anticipate difficult decisions early in the response pertaining to the level of operational engagement. For example, the Incident Commander may elect to commit individuals to rescue operations inside an unstable structure or dedicate individuals to assisting evacuees in proximity to an IED.
Decisions that commit individuals to dangerous areas must include the use of hazard and risk assessment and prescribed or agency operational procedures.
209
Explosive Devices Used as WMD (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
Safety Considerations for Individuals (continued)
•  Other Hazards: Individuals should always be aware of the potential for multiple hazards when on the scene of a WMD incident. •  Safety Standardization: Do not use two-way radios, radar, or television transmitting devices within three hundred feet. Notify proper authorities depending on the jurisdiction and situation. Stage emergency medical service, fire, and police units outside the control point. To prevent further harm from explosive devices, individuals should use standard isolation zones during an IED incident.
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
Important Concepts Regarding Explosives (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  If you are not an EOD (Explosive Ordnance Disposal) specialist and you respond to the scene of a potential explosive device and you can actually see the suspect device (i.e., bomb, IED), you should immediately remove yourself and others from the immediate area of the device to a safe location.
•  The possibility of secondary devices is always a given at any explosive incident site and therefore should be the responders’ first consideration.
•  If you respond to the scene of a possible bomb explosion or are near the vicinity of a possible bomb explosion, always be aware that a secondary device may be present.
227
Important Concepts Regarding Explosives (From U.S. Department of Homeland Security WMD Awareness Level Training Student Manual AWR-160)
•  If you arrive on the scene of an incident, see signs of a violent explosion, and observe trauma and severe property damage, you should first consider the possibility of secondary devices.
•  It is very important to remember when dealing with improvised explosive devices (IED) that they can take on any appearance, be of any shape and size, as well as represent any common object.
228
Lesson Six Review
As a result of having completed Lesson Six you should be able to answer the following questions:
1.  What are the three categories of energetic or explosive materials?
2.  What are the six stimuli or insults that can detonate an explosive?
3.  What are the three high explosive categories?
4.  What are the four components of an Explosive Device (ED)?
5.  What are the three types of explosive incidents?
229
LESSON SEVEN
Examples of CBRNE Terrorist Groups and Notable Terrorist Acts
(From the American Board for Certification in Homeland Security and Various United States of America Government Public Domain Documents and Publications)
230
Psychological Considerations for Terrorist Incidents
•  “Psychological Phobias” –  Fear impact different than a natural disaster •  Sense of Personal Security Compromised –  Decontamination is intrusive and separates people from personal effects and familiar locations (home, office) –  Was decontamination successful (good enough)? –  Expectation of another attack •  Responder Concerns –  Secondary devices (responder is target) –  Exposed to trauma outside of their experience –  Information may be restricted
231
232
233
234

The Madrid Spain Train Bombings Case Study 2004 (From the American Board for Certification in Homeland Security)
235
236
237
238
239
240
241
242
243
244
245
246
Political Aftermath of the Madrid Train Bombing
•  Prior to the Madrid train bombing the group responsible for the bombings, called for Spain to disengage in Iraq and pull their troops out of the country, where they were supporting U.S. efforts against the dictator Saddam Hussein.
•  The then Ruling Party in Spain refused.
•  Two days after the train bombings the Ruling Party was voted out of office in a previously scheduled national election.
•  The Opposition Party won the elections resoundingly defeating the Ruling Party.
•  The day after the Opposition Party took office they declared that they would pull all Spanish troops out of Iraq.
•  They did so over the next few months.
•  Terrorism is most effective at times!
247
The London Train Bombings Case Study 2005 (From The British Broadcasting Corporation – BBC)
248
The London Train Bombings (From The American Broadcasting Corporation or ABS and The British Broadcasting Corporation or BBC)
Overview:
Four suicide bombers struck in central London on Thursday, 7 July 2005, killing 52 people and injuring more than 770. The bombs went off at 0850 BST on the underground trains just outside Liverpool Street and Edgware Road Stations and on another train traveling between King’s Cross and Russell Square. The final explosion was around an hour later on a double-decker bus in Tavistock Square not far from King’s Cross.
249
This Piccadilly line train carriage was wrecked in one of the blasts.
The London Train Bombings (From The American Broadcasting Corporation or ABS and The British Broadcasting Corporation or BBC)
Analysis:
Report IDs the following failings •  Poor communication between emergency workers in the aftermath of the bombings •  A lack of basic medical supplies hampered all rescue operations •  As in 9/11, mobile phone systems were overwhelmed •  A need was identified for more digital radios for emergency services •  As soon as the blasts occurred underground, trains were thrown into total darkness, survivors walked on and over causalities to escape. 250 Despite the bus bomb damage, some top deck passengers survived the blast.
The London Train Bombings (From The American Broadcasting Corporation or ABS and The British Broadcasting Corporation or BBC)
Analysis (continued):
Hundreds of people were injured both above and underground simultaneously, in a very wellplanned, rehearsed, and coordinated terrorist attack. The true number of causalities may never be known due to the fact that hundreds of walking wounded just walked away from the scene without being interviewed or seeking medical assistance.
251
Some of the carnage above ground in the streets of London.
The London Train Bombings (From The British Broadcasting Corporation or BBC)
Following the route of the terrorists
252
The London Train Bombings (From The British Broadcasting Corporation or BBC)
Actual surveillance photos of the terrorists entering the “Tube” (or the London Underground Train Subway System)
253
The London Train Bombings (From The British Broadcasting Corporation or BBC)
The terrorists split up and go on their separate ways just prior to detonation of their devices.
254
The London Train Bombings (From The British Broadcasting Corporation or BBC)
The terrorist bombs explode simultaneously.
255
The London Train Bombings (From The British Broadcasting Corporation or BBC)
The final bomb blast
256
The London Train Bombings (From The British Broadcasting Corporation or BBC)
After the carnage, the terrorists and their targets
257
2006
The attempted bombing of twelve international transoceanic airliners from London’s Heathrow International Airport bound for numerous destinations within the United States were thwarted by the British MI5 and the FBI.
258
Never Say Never
Great Britain June 2007
259
2007
London Failed Car Bombs and Glasgow Airport Car Bombings
260
Streets in Central London Cordoned Off After Discovery of Bomb-laden Cars (From The British Broadcasting Corporation or BBC)
Friday, 29 June 2007:
Two Mercedes containing petrol (or gas), gas cylinders (or LP gas), and nails failed to explode in central London in the early hours of Friday morning (0300 hours).
261
Central London Cordoned Off in Wake of Aborted Terrorist Car Bomb Attack (From The British Broadcasting Corporation or BBC)
Friday, 29 June 2007 (Continued):
One car was left outside The Tiger Club on Haymarket.
262
One of the Two Bomb-laden Cars Being Inspected by EOD in Central London (From The British Broadcasting Corporation or BBC)
Friday, 29 June 2007 (Continued):
Police were alerted by an ambulance crew who spotted smoke in the car.
263
Bomb-laden Car Being Processed at Crime Scene in Central London
Friday, 29 June 2007 (Continued):
An explosive device was defused at the scene.
264
Londoners Evacuating Central London After Police Discovery of Bomb-laden Car (From The British Broadcasting Corporation or BBC)
Friday, 29 June 2007 (Continued):
A second unattended car was found parked illegally several blocks away from the first car.
265
Suspect Terrorist Vehicle Being Processed at the Scene (From The British Broadcasting Corporation or BBC)
Friday, 29 June 2007 (Continued):
This second car also contained a bomb and was towed from nearby Cockspur Street where it had been parked illegally.
266
One of Two Bomb-laden Cars in London Being Taken to Police Impound Lot (From The British Broadcasting Corporation or BBC)
Friday, 29 June 2007 (Continued):
However, the second bomb was not initially discovered at the scene.
267
Suspect Terrorist Vehicle Being Removed from Scene (From The British Broadcasting Corporation or BBC)
Friday, 29 June 2007 (Continued):
The second car was taken to a car compound (or impound lot) on Park Lane.
268
Terrorist Car Being Secured Prior to Transport to Impound Lot (From The British Broadcasting Corporation or BBC)
Friday, 29 June 2007 (Continued):
While in the impound lot it too was observed to have smoke coming from inside the car.
269
Controlled Explosion of one of Two Bomb-laden Cars in Central London (From The British Broadcasting Corporation or BBC)
Friday, 29 June 2007 (Continued):
Upon further examination, it too was found to contain a similar explosive device.
The car was made safe/ deactivated by a controlled explosion initiated by the police.
270
Central London Terrorist Car Bomb Scene Locations (From The British Broadcasting Corporation or BBC)
Friday, 29 June 2007 (Continued):
Here you see depicted on an overlay map of London, the locations of both vehicles as they were found parked on the streets, in relation to other central London landmarks.
271
Vehicle Crashing into the Glasgow Airport’s Terminal One Building (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007:
A burning car loaded with gas cylinders was driven at the Main Terminal Building at Glasgow’s International Airport at 1515 hours BST.
272
Glasgow Airport after Initial Impact of Terrorist Bomb-laden Car (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007 (Continued):
The attack was linked to the failed car bombings in London, police said.
273
Bomb-laden Car Explodes at Glasgow Airport Terminal (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007 (Continued):
While still in the car, terrorists set the car on fire then drove it into the Main Terminal Passenger Entrance at Glasgow, at which time it exploded.
274
Terrorist Car Burning at Main Entrance to Glasgow Airport Terminal after Exploding (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007 (Continued):
Immediately upon striking the terminal building, the car erupted into flames totally engulfing the two terrorists inside.
275
Glasgow Airport on Fire after Terrorist Car Bomb Attack (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007 (Continued):
At this time the alarm went out and law enforcement responded.
276
Terrorist on Fire after Exiting His Burning Car (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007 (Continued):
A passerby extinguished the flames engulfing one of the terrorists with a fire extinguisher.
277
Airport Police Subdue Terrorist after He Exits Burning Car (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007 (Continued):
Two men were arrested at the scene.
One of the men, later identified as Kafeel Ahmed, had serous burns and was taken to the hospital where he was placed in serious condition.
He later died.
278
Suspect Terrorist Taken into Custody at Glasgow Airport after Exiting Burning Car Laden with Explosives (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007 (Continued):
The other man was later named as Iraqi doctor (MD), Bilal Abdullah.
279
Terrorist Being Taken into Custody at Glasgow Airport (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007 (Continued):
About 2115 BST the same day, police arrested a 26-year-oldman and a 27-year-old woman on the M6 (a highway) near Sandbach in Cheshire.
They were later identified as accomplices.
280
First Responders Rush to Scene of Glasgow Airport Terrorist Car Bombing (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007(Continued):
The man was later named as Dr. Mohammed Asha, MD.
281
First Responders Extinguish Fire after Glasgow Airport Terrorist Car Bombing (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007 (Continued):
The female arrested with Dr. Asha was his wife, also a Physician.
282
Entrance to Glasgow Airport Closed in the Aftermath of Terrorist Bombing (From The British Broadcasting Corporation or BBC)
Saturday, 30 June 2007 (Continued):
Dr. Asha, who qualified (went to medial school) in Jordan, worked as a junior doctor (or intern) at the Royal Shrewsbury Hospital and the Princess Royal Hospital in Telford.
283
The Story Behind the Glasgow Bombings
•  Great Britain was (and still is) in great need of physicians.
•  Several years ago they instituted a fast track program, allowing foreign doctors to enter their country and apply for citizenship with minimal background and security checks.
•  All the doctors who were involved in the Glasgow bombing incident were all doctors who entered Great Britain under the auspices of this fast track program for physicians.
284
Lesson Seven Review
As a result of having completed Lesson Seven you should be able to answer the following questions:
1. What are the four components of an Explosive Device (ED)?
2. What are the three types of explosive incidents?
3. What was the political aftermath of the Madrid train bombing?
4. Who said, “Killing Americans and their allies, civilian and military, is an individual duty of every Muslim…we do not differentiate between those dressed in military uniforms and civilians.”?
285
LESSON EIGHT
Primary Terrorist Organizations World Wide
286
Terrorist Groups
(In no particular order of importance or precedence)
287 Mar-1-11
Sources of Terrorism “The Threat” (From The American board for Certification in Homeland Security) Types of Terrorists and Groups by Persuasion and Funding
•  Lone Disaffected Individuals: Lone Wolf •  Local or Non-aligned Terrorist Groups: Independents •  Internationally Sponsored: State Sponsored Terrorists •  Doomsday Groups: Cults •  Religious Fanatics: Zealots •  Political Insurgents: Revolutionaries •  Domestic Terrorists: Anarchists
288 Mar-1-11
Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
Terrorist Groups General Information
•  Currently there are more than sixty-five “major” active terrorist organizations around the world according to the U.S. Department of State.
•  Half of these are considered extremely dangerous and serious threats.
•  Many of the groups are well known throughout the world.
•  Many more are far less known and are never heard of outside of their individual countries in which they operate.
289 Mar-1-11
Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups
•  The U.S. Government breaks foreign terrorists into two groups. 1.  Designated Foreign Terrorist Organizations 2.  Non-designated Yet Still Active Terrorist Groups (or “minor” terrorist groups with no close affiliation outside a specific region and not aligned to any nation state or state sponsored terrorism)
290
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued) The following is a small list which includes only some of the groups defined by the U.S. Government as designated foreign terrorist organizations. •  Abu Nidal: Also known as the Fatah Revolutionary Council, Arab Revolutionary Brigades, Black September, Revolutionary Organization of Socialist Muslims Based in Iraq, but also operates out of Lebanon Has carried out attacks in twenty countries, killing over 1,100 people Targets include: the United States, United Kingdom, France, Israel, and moderate Palestinians
291
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Abu Sayyaf Group (ASG): The “Islamic Separatist Group” operates in the Philippines Tactics include bombings, assassinations, kidnappings, and extortion Promotes an independent Islamic state in the Philippines Developed ties to the Mjuahidin while fighting and training in Afghanistan Responsible for kidnapping three Americans and seventeen Filipinos in May of 2001
292
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Al-Aqsa Martyrs Brigade: An outgrowth of the Intifadah (or shaking) Goal is to drive Israel from the West Bank, Gaza Strip, and Jerusalem, and establish a Palestinian state Has carried out shootings and suicide operations against Israeli military personnel and civilian personnel as well as killed Palestinians who collaborated with Israel In January 2002, was responsible for first suicide bombing carried out by a female
293
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Asbat Al-Ansar: (or the “Partisans’ League”) a Sunni group born in the Palestinian refugee camps in Lebanon Associated with Al Qaeda and follows extremist interpretation of Islam; justifies violence against civilians Has carried out several terrorist attacks in Lebanon including bombings and assassinations Targets include attack on Russian Embassy in Beirut

294
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Aum Shinrikyo: (or “Supreme Truth”) also known as Aleph, a cult established in 1987 to take over Japan and the world Believes the end of the world is imminent and that the U.S. will start World War III with an attack on Japan In March 1995, released chemical nerve agent sarin in Tokyo subway system, killing twelve people and injuring over 6,000 Followers were arrested for attempting to blow-up the Imperial Palace in Tokyo in July 2001
295
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Hamas: (or “Islamic Resistance Movement”) Formed in 1987, this Palestinian group supports the use of terrorism to establish an Islamic state in place of Israel; dedicated to the elimination of the state of Israel Group concentrated in the Gaza Strip and on the West Bank Has conducted numerous large-scale suicide (homicide) bombings against Israeli civilian and military targets Very political group; currently the elected government of the Palestinians

296
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
Hezbollah: (or “Party of God”) Also known as the Islamic Jihad, Revolutionary Justice Organization, Organization of the Oppressed on Earth, and the Islamic Jihad for the Liberations of Palestine Maintains, controls, and directs terrorist cells in North and South America Originally started out of the Bekaa Valley in Lebanon and the suburbs of Beirut but is now all over Lebanon; A radical Shiite group formed in 1982 that rivals the democratically elected government of Lebanon for control Dedicated to the overthrow of Israel and is considered among the most dangerous terrorist groups. Has close ties with Iran and Syria; strongly anti-Israeli and anti-Western
297
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued) •  Hezbollah (continued): Involved in the suicide truck bombings of the U.S. Embassy and the Marine Corps barracks in Beirut (October 1983) Group responsible for kidnapping, detention, and death of U.S. and other western h(i.e., Terry Waite from the UK) in Lebanon during 1980s
NOTE: Hezbollah is believed by many (including the U.S. Government) to be the most dangerous terrorist group in the world today.
298
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Al-Jihad: An Egyptian extremist group also known as: Egyptian Islamic Jihad, Jihad Group, and Islamic Jihad; based in and operates from Cairo, Egypt Constituted in 1970s links to Al Qaeda and has ties to Iran Goal is to overthrow the Egyptian government and replace it with an Islamic state Responsible for 1981 assassination of Egypt’s President Anwar Sadat Area of operation: Afghanistan, Lebanon, Pakistan, Sudan, the United Kingdom, and Yemen
299
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Mujahedin-e Khalq Organization: Also known as MEK or MKO; established in the 1960s in Iran Formed to counter the Western influence during the Shah’s reign A combination of Marxism and Islam Take-over of the U.S. Embassy in Tehran, Iran, in 1979; supported Saddam Hussein during Iraq’s war with Iran during the 1980s
300
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  The Palestine Islamic Jihad: (or PIJ), founded by militant Palestinians in the Gaza Strip during the 1970s; now headquartered in Syria Committed to the creation of an Islamic Palestinian state and the destruction of Israel through holy war Considers Israel and United States as the enemy Opposes pro-Western Arab governments Conducts suicide (homicide) bombings in the West Bank, the Gaza Strip, and Israel
301
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Palestine Liberation Front: (or PLF) has splintered into various factions Responsible for the 1985 attack on cruise ship Achille Lauro and the murder of Leon Klinghoffer, a handicapped (wheelchair bound), elderly American citizen and only person to die as a result of the attack Based in Iraq
302
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Palestine Liberation Organization: (or PLO) originally called “The Brotherhood,” started in Egypt in the 1950s by an Egyptian college professor Carried/renamed in later years as the PLO under leadership of the Egyptian born Yasir Arafat who claimed during his lifetime to be a Palestinian Responsible for hundreds of homicide bombings and the Intifada (war with Israel) Previously claimed to speak for all disaffected Palestinians as their true government in exile, but has lost stature and voice in the Arab and Palestinian world since Arafat’s death
303
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Popular Front for the Liberation of Palestine: (or PFLP) a Marxist-Leninist group founded in 1967 by George Habash, a disaffected member of the Palestine Liberation Organization (PLO) Has committed numerous terrorist attacks; targets Israelis and moderate Arabs Operates in Israel, Lebanon, Syria, and the “occupied territories” Group opposes Palestinian peace talks and tries to derail them by committing acts of violence (terrorism)
304
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Al Qaeda: Established by Osama Bin Laden in the late 1980s in Afghanistan, the group is comprised largely of Arabs who fought in Afghanistan against the Soviet Union The current goal is to establish a Pan-Islamic caliphate (office of dominion) throughout the world In 1998, bombed the U.S. Embassies in Kenya and Tanzania (301 killed in action—KIA), was responsible for the attack on the USS Cole in the port of Aden, Yemen, in 2000 (17 KIA) Responsible for both the attacks on the World Trade Center in 1993 (unsuccessful) and 2001 (successful), and the attack on the Pentagon (successful) in 2001 (2001 WTC and Pentagon Attacks = 3,000 KIA)
305
Major Terrorist Groups Today (From The Complete Terrorism Survival Guide by Juval Aviv. Juris Publishing, Inc., Huntington, New York)
International Terrorist Groups (continued)
•  Al Qaeda (continued): Linked to several failed terrorist attacks over the years: –  Attempt to assassinate Pope John Paul II –  Attempt to assassinate President Clinton –  Bombing flights from UK to US while in flight –  Exploding a bomb at the Los Angeles International Airport on New Years Eve in 2000

306
Lesson Eight Review
As a result of having completed Lesson Eight you should be able to answer the following questions:
1.  What is the origin of Al Qaeda and why was it originally established? 2.  When and where was Al Qaeda established? 3.  What is Al Qaeda’s current goal? 4.  What is the origin of the PLO and what was it originally called? 5.  What is the origin of Hezbollah and what other five names does it go by? 6.  What is the origin of Hamas and where is it concentrated?” 7.  How many groups does the U.S. Government divide foreign terrorists into and what are they called? 8.  How many major active terrorists organizations does the U.S. Department of State currently identify?
307
LESSON NINE The National Incident Management System (NIMS) and The Incident Command System (ICS)
308
The National Incident Management System (NIMS) (Unless specifically credited otherwise, the source of the material presented in this section is the American Board for Certification in Homeland Security)
“The only thing necessary for The triumph of evil is… For good men to do nothing. ”
—Edmond Burke
309
310
Order Out of Chaos (NIMS)
311
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
Inception
•  On February 28, 2003, President Bush issued Homeland Security Presidential Directive-5 (HSPD-5).
•  HSPD-5 directed the secretary of Homeland Security to develop and administer a National Incident Management System (NIMS).
•  NIMS provides a consistent nationwide template to enable all government, privatesector, and nongovernmental organizations (NGO) to work together during domestic incidents.
•  NIMS has systemic, key concepts, and principles that benefit and facilitate incident management during a response to a domestic incident.
312
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
What Is the National Incident Management System? •  NIMS is a comprehensive, national approach to incident management that is applicable at all jurisdictional levels and across functional disciplines. •  The intent of NIMS is to: –  Be applicable across a full spectrum of potential incidents and hazard scenarios, regardless of size or complexity –  Improve coordination and cooperation between public and private entities in a variety of domestic incident management activities
313
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
NIMS Compliance •  HSPD-5 required federal departments and agencies to make the adoption of NIMS by state and local organizations a condition for Federal Preparedness Assistance (i.e., grants, contracts, and other activities) by the FY 2005 NIMS Compliance Package. •  Jurisdictions can comply in the short term by adopting the Incident Command System (ICS). •  Other aspects of NIMS require additional development and refinement to enable compliance at a future date.
314
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
Why Do We Need a National Incident Management System?
•  Emergencies occur every day somewhere in the United States. These emergencies are large and small and range from fires to hazardous materials incidents to natural and technological disasters.
•  Each incident requires a response. Whether from different departments within the same jurisdiction, from Mutual Aid Partners (MAP), or from state and federal agencies, responders need to be able to work together, communicate with each other, and depend on each other.
•  Until now, there have been no standards for domestic incident response that reached across all levels of government and all emergency response agencies (ERA).
315
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
Why Do We Need a National Incident Management System? (continued)
•  The events of September 11, have underscored the need for and importance of national standards for incident operations, incident communications, personnel qualifications, resource management, information management, and supporting technology.
•  To provide standards for domestic incident response, President Bush signed Homeland Security Presidential Directive-5 (HSPD-5).
•  NIMS provides for interoperability and compatibility among all responders.
316
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
NIMS Concepts and Principles NIMS provides a framework for interoperability and compatibility by balancing flexibility and standardization.
•  NIMS provides a flexible framework that facilitates government and private entities at all levels working together to manage domestic Incidents.
•  This flexibility applies to all phases of incident management, regardless of cause, size, location, or complexity.
•  NIMS provides a set of standardized organizational structures, as well as requirements for processes, procedures, and systems designed to improve interoperability.
317
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
NIMS Components NIMS is comprised of several components that work together as a system to provide a national framework for preparing for, preventing, responding to, and recovering from domestic Incidents. These components include: 1.  Command and management 2.  Preparedness 3.  Resource management 4.  Communications and information management 5.  Supporting technologies 6.  Ongoing management and maintenance
318
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
1.  Command and Management NIMS standard incident management structures are based on three key organizational systems: The Incident Management System (IMS): Defines the operating characteristics, management components, and structure of incident management organizations throughout the life cycle of an incident Multiagency Coordination Systems: Define the operating characteristics, management components, and organizational structure of supporting entities Public Information Systems: Include the processes, procedures, and systems for communicating timely and accurately information to the public during emergency situations
319
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) 2.  Preparedness Effective incident management begins with a host of preparedness activities. These activities are conducted on a steady-state basis, well in advance of any potential incident. Preparedness involves a combination of: •  Planning, training, and exercises •  Personnel qualification and certification standards •  Equipment acquisition and certification standards •  Publication management processes and activities •  Mutual aid agreements and emergency management assistance compacts
320
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
3.  Resource Management The resource management component of NIMS is not yet fully implemented. When fully implemented, NIMS will define standardized mechanisms and establish requirements for the following over the life cycle of an incident: •  Describing •  Taking inventory •  Mobilizing •  Dispatching •  Tracking •  Recovering resources
321
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
4.  Communications and Information Management NIMS identifies the requirements for a standardized framework for communications, information management, and information sharing at all levels of incident management. •  Incident management organizations must ensure that effective interoperable communications processes, procedures, and systems exist across all agencies and jurisdictions. •  Information management systems help ensure the information flows efficiently through a commonly accepted architecture. Effective information management enhances incident management and response by helping to ensure that decision making is better informed.
322
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
5.  Supporting Technologies Technology and technological systems provide supporting capabilities essential to implementing and refining NIMS. Examples include: •  Voice and data communication systems. •  Information management systems (such as recordkeeping and resource tracking) •  Data display systems Supporting technologies also include specialized technologies that facilitate ongoing operations and incident management activities in situations that call for unique, technology-based capabilities.
323
NIMS (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
6.  Ongoing Management and Maintenance DHS established the NIMS Integration Center to provide strategic direction and oversight in support of routine review and continual refinement of both the system and its components over the long term.
324
NIMS Incident Command and Management General Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  Analysis of past responses indicate that the most common cause of response failure is poor management.
•  Confusion about who is in charge of what and when, together with unclear lines of authority, have been the greatest contributors of poor response.
•  The command and management under NIMS has some definite benefits of using ICS as the model incident management system.
325
NIMS Incident Command and Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) NIMS employs two levels of incident management structures, depending on the nature of the incident. 1.  Incident Command System (ICS): A standard, on-scene, all-hazard incident management system; ICS allows users to adopt an integrated organizational structure to match the needs of single or multiple incidents 2.  Multiagency Coordination Systems: A combination of facilities, equipment, procedures, and communications integrated into a common framework of coordinating and supporting incident management
326
327
328
NIMS Incident Command and Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  NIMS requires that responses to all domestic incidents utilize a common management structure.
•  The Incident Command System (or ICS) is a standard, on-scene, all-hazard incident management concept. ICS is a proven system that is used widely for incident management by firefighters, law enforcement, rescuers, emergency medical teams, and hazardous materials (HAZMAT) teams.
•  ICS represents organizational best practices and has become the standard for incident management across the country.
•  ICS is interdisciplinary and organizationally flexible to meet the needs of incidents of any kind, size, or level of complexity.
•  Using ICS, personnel from a variety of agencies can meld rapidly into a common management structure.
329
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
ICS has been tested for more than thirty years and used for: •  Planned events •  Fires, hazardous materials spills, and multi-casualty incidents •  Multi-jurisdictional and multi-agency disasters, such as earthquakes and winter storms •  Search and rescue missions •  Biological outbreaks and disease containment •  Acts of terrorism ICS helps all responders communicate and get what they need when they need it. ICS provides a safe, efficient, and cost-effective recovery strategy.
330
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) ICS Features
ICS has several features, eight in all, that make it well suited to managing incidents. These features include: 1.  Common terminology 2.  Organizational resources 3.  Manageable span of control 4.  Organizational facilities 5.  Use of position titles 6.  Reliance on an incident action plan 7.  Integrated communications 8.  Accountability
331
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) 1.  Common Terminology •  The ability to communicate within ICS is absolutely critical. •  Using standard or common terminology is essential to ensuring efficient, clear communications. •  ICS requires the use of common terminology, including standard titles for facilities and positions within the organization. •  Common terminology also includes the use of clear text—that is, communication without the use of agency-specific codes or jargon. In other words—use plain English.
332
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) 1.  Common Terminology (continued) •  Examples: Uncommon Terminology: “Response Branch, this is HAZMAT 1. We are 10-24.”
Common Terminology: “Response Branch, this is HAZMAT 1. We have completed our assignment.”
333
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) 2.  Organizational Resources •  Resources, including all personnel, facilities, and major equipment and supply items used to support incident management activities, are assigned common designations. •  Resources are typed with respect to capability to help avoid confusion and enhance interoperability.
334
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) 3.  Manageable Span of Control •  Maintaining adequate span of control throughout the ICS organization is critical. •  Effective span of control may vary from three to seven, and a ratio of one supervisor to five reporting elements is recommended. •  If the number of reporting elements falls outside of this range, expansion or consolidation of the organization may be necessary. •  There may be exceptions, usually in lower-risk assignments or where resources work in close proximity to each other.
335
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) 4.  Organizational Facilities •  Common terminology is also used to define incident facilities, help clarify the activities that take place at a specific facility, and identify what member of the organization can be found there. •  For example, you find the Incident Commander at the incident command post. Incident facilities include: 1. The incident command post 2. One or more staging areas 3. A base 4. One or more camps (when needed) 5. A helibase 6. One or more helispots
336
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
4.  Organizational Facilities (continued) •  Incident facilities will be established, depending on the kind and complexity of the incident. •  Only those facilities needed for any given incident may be activated. •  Some incidents may require facilities not included on the standard list.
337
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
5.  Use of Position Titles ICS positions have distinct titles: •  Only the Incident Commander is called commander—there is only one Incident Commander per incident. •  Only the heads of sections are called chiefs. •  Learning and using standard terminology helps reduce confusion between the day-to-day position occupied by an individual and his or her position at the incident.
338
NIMS POSITION TITLES (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and )
339
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) 6.  Reliance on an Incident Action Plan •  Incident Action Plans (IAP) provide a coherent means to communicate the overall incident objectives in the context of both operational and support activities. •  IAP are developed for operational periods that are usually twelve hours long. •  IAP depend on Management by Objectives (MBO) to accomplish response tactics.
340
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) 6.  Reliance on an Incident Action Plan (continued) •  These IAP objectives are communicated throughout the organization and are used to: 1.  Develop and issue assignments, plans, procedures, and protocols 2.  Direct efforts to attain the objectives in support of defined strategic objectives •  Results are always documented and fed back into planning for the next operational period.
341
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) 7.  Integrated Communications •  Integrated communications include: 1.  The hardware systems that transfer information 2.  Planning for the use of all available communications frequencies and resources 3.  The procedures and processes for transferring information internally and externally
342
NIMS Incident Command Management Detailed Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) 8.  Accountability •  Effective accountability at all jurisdictional levels and within individual functional areas during an incident is essential. •  To that end, ICS requires: 1. An orderly chain of command—the line of authority within the ranks of the incident organization 2. Check-in for all responders, regardless of agency affiliation 3. Each individual involved in incident operations is to be assigned only one supervisor (also called unity of command)
343
344
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  The basic ICS principle is that the first public service person to arrive at the scene of an incident assumes the position of Incident Commander and is responsible until the authority is delegated to another person. •  Expansion of incidents may require the delegation of authority for the performance of operations, planning, logistics, and finance/administration functions. These functions are performed by the Incident Commanders general staff. •  The incident base is the location where primary logistics and administrative functions are coordinated and administered. •  The position of Incident Commander is the only position in the incident command chain of command that is staffed in all ICS applications.
345
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  ICS has been used to manage incidents such as fires, earthquakes, hurricanes, and acts of terrorism. It can be used for the planning and operation of private as well as public celebrations, parades, and fairs—any function or event that requires coordination between disparate groups and organizations. •  Depending upon the size and type of incident or event it may be necessary for the Incident Commander to designate personnel to provide public information, safety, and liaison services for the entire organization. These functions are performed by the Incident Commander’s command staff. •  Every incident must have a verbal or written incident action plan. The purpose of this plan is to provide all incident supervisory personnel with the direction for taking actions based on the objectives identified in the plan during the operational period.
346
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  The ability to communicate within ICS is absolutely critical to mission accomplishment. Therefore, common terminology is used across the board at all levels to ensure efficient, clear communications, within the ICS chain of command. •  Confusion over different position titles and organizational structures has been a significant stumbling block to effective incident management in the past. Therefore, there is no correlation between the ICS organization and the administrative structure of any single agency or jurisdiction. •  In ICS, the Operations Section Chief conducts tactical operations, Develops the tactical objectives and organization, and directs all tactical resources. •  In ICS, the Public Information Officer serves as the conduit between internal and external stakeholders, including the media or other organizations seeking information directly from the incident or event.
347
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  ICS uses distinct titles at each organizational level for individuals in positions of primary responsibility. These distinct titles provide three important purposes 1.  Allow for filling ICS positions with the most qualified individuals rather than by rank. 2.  Distinct titles provide a common standard for all users. 3.  Standard position titles are useful when requesting qualified personnel. •  In ICS, the Planning Chief prepares and documents the incident action plan, collects and evaluates information, maintains resource status, and maintains documentation for incident records.
348
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  In ICS, span of control relates to the supervisory structure of the organization and pertains to the number of individuals or resources one incident supervisor can manage effectively. •  In ICS, the Logistics Section Chief is responsible for ensuring that assigned incident personnel are fed and have communications, medical support, and transportation as needed to meet the operational objectives. •  In ICS, the Safety Officer monitors safety conditions and develops measures for assuring the safety of all assigned personnel. •  An ICS incident action plan always has measurable strategic operations to be achieved within a specified period.
349
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  In ICS, all personnel and equipment are kept in an incident facility called the staging area while waiting for tactical assignments. •  In ICS, the Finance/Administration Section Chief manages costs related to the incident, as well as providing accounting, procurement, time recording, and cost analysis. •  The Incident Commander typically supervises the incident from the incident command post, which is outside of the present and potential hazard area. •  When personnel report for duty as a member of an incident response team, the process called check-in officially logs you in at the incident. •  The check-in process and information provided help to locate personnel in case of an emergency.
350
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  In ICS, the Liaison Officer serves as the primary contact for supporting agencies assigned to an incident. •  After check-in all responding personnel reporting as part of an incident response team should locate their incident supervisor and receive their initial briefing. •  From the very inception of the ICS system, designers of the system recognized early on, that ICS must allow personnel from a variety of agencies to meld rapidly into a common management structure. •  In ICS, the camp is the incident facility where resources are kept to support incident operations if a base is not accessible to all resources.
351
352
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  One of the key principles of ICS is unity of command. Unity of command means that each individual involved in incident operations will be assigned to only one supervisor. •  While ICS is in effect during an incident, formal communication is used in reporting progress of assigned tasks. •  During the implementation of ICS many priorities arise. The top priority within the ICS common leadership responsibilities is ensuring safe work practices. •  ICS, as an organization, may have deputy positions at the levels of branch, incident command, and section. •  Branches within the ICS organization can be established geographically or functionally.
353
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  In ICS, span of control is accomplished by organizing resources into teams, divisions, groups, branches, or sections. •  While ICS is in affect, and the incident scope is complex or beyond existing authorities, delegation of authority may be needed. •  During the ICS process, the operations section is responsible for determining the appropriate tactics for an incident. •  In order to insure uniformity and consistency in the ICS approach to an incident, Emergency Operations Plans written after October 2005 must be consistent with the National Incident Management System (NIMS). •  In order to insure mission success and competency at the highest level during any incident, the individual assuming the role of the Deputy Incident Commander must be equally capable of assuming the Incident Commander role.
354
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  During the ICS process, representatives from assisting or cooperating agencies and organizations coordinate through the Liaison Officer. •  During the execution of the ICS system, the information and intelligence function may be organized as a separate general staff section. •  While actively engaged in an ICS incident, resources within the staging areas are assigned and should be available for deployment. •  The regularly scheduled briefing that takes place during an ICS incident is called the operational period briefing. This briefing presents the Incident Action Plan (IAP) for the upcoming period to supervisory personnel. •  In ICS, the finance/administration section is responsible for handling claims related to property damage, injuries, or fatalities at the incident.
355
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  ICS has many forms associated with it. ICS Form 201 contains status information for briefing the incoming Incident Commander or team or other resources. •  In the ICS process, the staff member who generally facilitates the operational period briefing is the Planning Section Chief. •  In order to maintain efficiencies of scale and to manage resources efficiently as well as employ them effectively, ICS organizational structure should include only the functions and positions needed to achieve the incident objectives.
356
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  ICS incidents are classified into five types or levels of complexity—Type Five being the least complex, and Type One being the most complex. •  ICS Type 5 Incident: Local village and township level •  ICS Type 4 Incident: City, county, or fire district level •  ICS Type 3 Incident: State or metropolitan area level •  ICS Type 2 Incident: National and state level •  ICS Type 1 Incident: National and state level with implications of grave and catastrophic disaster
357
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  In ICS, typing resources refers to the grouping and accounting of resources by type. Typing resources allows managers to make better resource ordering decisions by describing the size, capability, and staffing qualifications of a specific resource. •  In order to insure continuity of operations, during an ICS incident, when command is transferred, all personnel with a need to know should be told the effective time and date of the transfer. •  When arriving at an Incident, the higher/highest ranking person will either: 1. Assume command, 2. Maintain command as is 3. Reassign command to a third party
358
Important ICS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  In ICS, the medical unit is responsible for the development of the medical plan, obtaining medical aid, and transportation for injured and ill incident personnel. •  In ICS management, span of control for any supervisor is: 1.  Between three and seven subordinates, 2.  Optimality does not exceed five subordinates. •  Throughout the entire incident, objectives are established based on the following priorities: First Priority—Life saving Second Priority—Incident stabilization Third Priority—Property preservation
359
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) Coordination to Facilitate Management While ICS has proven itself to be effective for all types of incidents, other levels of coordination may be required to facilitate management of: •  Multiple concurrent incidents •  Incidents that are non-site specific, such as biological terrorist incidents •  Incidents that are geographically dispersed •  Incidents that evolve over time
360
NIMS Unified Command (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/ and Emergency Management Institute)
361
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) What Is Unified Command?
Simply put unified command is an application of ICS used when: 1.  There is more than one responding agency with responsibility for the incident 2.  Incidents cross political jurisdictions
362
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
What Is Unified Command? (continued)
For example, a unified command may be used for: 1.  A hazardous materials spill that contains a nearby reservoir In this incident, the fire department, the water authority, and the local environmental authority may each participate in a unified command. 2.  A flood that devastates multiple communities In this case, incident management personnel from key response agencies from each community may participate in a unified command.
363
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) How Does Unified Command Work?
•  Under a unified command, agencies work together through the designated members of the unified command to: 1.  Analyze the intelligence information 2.  Establish a common set of objectives and strategies for a single incident action plan •  Unified command does not change any of the other features of ICS. It merely allows all agencies with responsibility for the incident to participate in the decision making process.
364
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) What Is an Area Command?
•  An area command is an organization established to: 1.  Oversee the management of multiple incidents that are each being managed by an ICS organization 2.  Oversee the management of large incidents that cross jurisdictional boundaries
365
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) What Is an Area Command? (continued)
•  Area commands are particularly relevant to public health emergencies because these incidents are typically: 1.  Not site specific 2.  Not immediately identifiable 3.  Geographically dispersed and evolve over time
366
NIMS Area Command (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute)
367
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) What Does an Area Command Do? •  The area command has the responsibility for: 1.  Setting overall strategy and priorities 2.  Allocating critical resources according to the priorities 3.  Ensuring that incidents are properly managed 4.  Ensuring that objectives are met 5.  Ensuring that strategies are followed •  An area command may become a unified area command when incidents are multijurisdictional or involve multiple agencies.
368
NIMS Area Command Organization (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute)
369
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
Multi-agency Coordination Systems •  Multi-agency coordination systems are a combination of resources that are integrated into a common framework for coordinating and supporting domestic incident management activities. These resources may include: 1.  Facilities 2.  Equipment 3.  Personnel 4.  Procedures 5.  Communications
370
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) What Do Multi-agency Coordination Systems Do?
•  The primary functions of multi-agency coordination systems are to: 1.  Support incident management policies and priorities 2.  Facilitate logistics support and resource tracking 3.  Make resource allocation decisions based on incident management priorities 4.  Coordinate incident-related information 5.  Coordinate interagency and intergovernmental issues regarding incident management policies, priorities, and strategies
371
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
What Do Multi-agency Coordination Systems Do? (continued)
•  Direct tactical and operational responsibility for the conduct of incident management activities rests with the on scene incident commander.
372
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
Multi-agency Coordination System Elements
•  Multi-agency coordination systems include Emergency Operations Centers (EOC) and, in certain multi-jurisdictional or complex incidents, multi-agency coordination entities.
•  NIMS EOC: 1.  Are the locations from which the coordination of information and resources to support incident activities takes place. 2.  Are typically established by the Emergency Management Agency at the local and state levels.
373
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) Multi-agency Coordination System Elements (continued)
•  Multi-jurisdictional or complex incidents: 1. Multi-agency coordination entities typically consist of principals from organizations with direct incident management responsibilities. 2. Multi-agency coordination entities typically consist of principals from organizations with significant incident management support or resource responsibilities. 3. These entities may be used to facilitate incident management and policy coordination.
374
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) Multi-agency Coordination Systems May Have Emergency Operations Centers (EOC)
• EOC organization and staffing is flexible but should include: 1.  Coordination 2.  Communications 3.  Resource dispatching and tracking 4.  Information collection, analysis, and dissemination
375
NIMS Emergency Operations Centers (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute)
376
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
Multi-agency Coordination Entity Incident Responsibilities
•  Regardless of their form or structure, multi-agency coordination entities are responsible for: 1.  Ensuring that each involved agency is providing situation and resource status information 2.  Establishing priorities between incidents and/or area commands in concert with the incident command or unified command 3.  Acquiring and allocating resources required by incident management personnel 4.  Coordinating and identifying future resource requirements 5.  Coordinating and resolving policy issues 6.  Providing strategic coordination
377
Command and Management Under NIMS In-depth Overview (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) Multi-agency Coordination Entity Post-incident Responsibilities
•  Following incidents, multi-agency coordination entities are typically responsible for ensuring that revisions are acted upon. •  Revisions may be made to: 1.  Plans 2.  Procedures 3.  Communications 4.  Staffing 5.  Other capabilities necessary for improved incident management •  These revisions are based on lessons learned from the incident. •  They should be coordinated with the emergency planning team in the jurisdiction and with mutual aid partners.
378
Important NIMS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  One of the chief benefits of NIMS is that it is applicable across jurisdictions and functions.
•  Regardless of cause, size, location, or complexity, NIMS provides a flexible framework that applies to all phases of incident management.
•  Within NIMS the Incident Command System (ICS) is a proven incident management system that is based on organizational best practices.
•  NIMS purports that within ICS the span of control may vary from three to seven.
•  NIMS dictates that the use of common terminology for ICS position titles helps to reduce confusion between a person’s position on an incident and his or hers day-today position.
379
Important NIMS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  Incident Action Plans (IAP) depend on management by objectives to accomplish response tactics.
•  The use of the unified command concept, is a good choice for a hazardous materials spill in which more than one agency has responsibility for the response.
•  The use of the area command concept, is a good choice for public health emergencies that are not site specific.
•  An area command organization does not include an operations section.
•  Making sure that resource allocation decisions are based on incident priorities is one key responsibility of multi-agency coordination systems.
380
Important NIMS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf) •  Multi-agency coordination and joint information activities may be supported by emergency operations centers.
•  The joint information system established policies, procedures, and protocols for gathering and disseminating Information.
•  Public Information Officers (PIO) operate within the parameters of the joint information system.
•  When a Joint Information Center (JIC) is established as part of a unified command, agencies or organizations contributing to joint public information management retain their organizational independence.
•  Joint information system protocols must be used by JIC when multiple JIC are established, in order for all the JIC to communicate and coordinate with each other on an ongoing basis.
381
Important NIMS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  The NIMS National Integration Center will maintain and manage national-level preparedness standards related to NIMS.
•  The establishment of guidelines and protocols for resource management is one responsibility of preparedness organizations at all levels.
•  A corrective action plan is based on lessons learned from actual incidents. •  To facilitate the definition of general training requirements and approved courses is one area of focus for the NIMS integration center.
•  The NIMS integration center will review and approve lists of equipment meeting national standards to help ensure that equipment performs to certain standards and is interoperable with equipment used by other jurisdictions.
382
Important NIMS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
•  In order to facilitate the timely delivery of assistance during incidents, Mutual Aid Agreements (MAA) and Emergency Management Assistance Compacts (EMAC) are helpful.
•  Resource typing involves the categorizing of resources based on performance. •  By establishing certification and credentialing standards for key personnel, NIMS ensures that all personnel possess a minimum level of training, experience, fitness, capability, and currency.
•  When the Incident Commander cannot obtain items locally, such requests for items must be submitted thought the multi-agency coordination entity.
•  Resource managers use established procedures to track resources continuously from mobilization through demobilization.
383
Important NIMS Concepts (From U.S. Federal Emergency Management Agency (FEMA) http://www.fema.gov/emergency/nims/, Emergency Management Institute and http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf)
And Finally:
•  NIMS standards for communications and information management are based on the principle that a common operating picture is required to ensure consistency among all who respond.
384
Lesson Nine Review
As a result of having completed Lesson Nine you should be able to answer the following questions: 1.  What is span of control? 2.  What is the Incident Command System (ICS)?” 3.  What is the National Incident Management System (NIMS)? 4.  Why do we need NIMS? 5.  What are the six components of NIMS? 6.  What are the two levels of ICS depending on the nature of the incident? 7.  What is unity-of-command? 8.  ICS classifies incidents into five types or levels of complexity. What are the levels by definition? 9.  In ICS throughout the entire incident, objectives are established based on three priorities. What are the three priorities?
385
Summary
•  In this CHS-IV course, we have seen that terrorists can and do take advantage of all types WMD since they are plentiful and most effective.
•  Terrorists have used one type or WMD or another throughout the world before, continue to do so long after 9/11, and will into the future.
•  In the future we will see chemical, biological, and radioactive material used as WMD.
•  The terrorist’s goal is to produce mass causalities and influence governments—the United States and its allies in particular.
•  It is doubtful if terrorism can ever be truly stopped considering the geopolitical complexities that exist in the world today.
•  The hope then is to lessen their impact on the free world.
386
Conclusion
•  At the conclusion of this CHS-IV course, students now have a much greater appreciation for WMD and the terrorists who use them. In some cases students will have a greater appreciation of how easy WMD are to acquire and use against a civilian population and thus cause not only death but panic as well, depending upon the WMD used.
•  Indeed, attacks using Weapons of Mass Destruction are both devastating and demoralizing. Both of these elements of WMD must be combated by the CHS certified individual. This is indeed the true challenge CHS certified personnel face.
•  We have seen that there are some basic procedures (i.e., time, distance, and shielding) that a person can take to protect himself/herself and advise the public to take accordingly.
•  However, the best method to avoid WMD exposure it to preempt an attack. If that is not possible, we are to mitigate its effects.
•  In the CHS-V certification course that follows, the student will be introduced to methods to accomplish both those tasks.
387
Acknowledgements and Credits of Sources
Material  and  information  used  as  background,  in  the  preparation  and  presentation  of  this  course  was  taken   directly,  or  in  part,  from  the  following  associations,  groups,  organizations,  public/private/commercial/ government  publications,  entities,  and/or  individuals:    NOTE:  All  pictures,  charts  and  graphic  representations  presented  in  this  CHS-­‐III  Level  Certi?ication  Course  were  taken   directly  from  either  published  United  States  government  publications  and/or  public  domain  entities  from  government   sources,  as  well  as  the  Internet,  to  include  ABCHS  proprietary  sources  as  indicated  throughout  the  body  of  this  course,   and  as  such  are  copyright  and  royalty  free.
388
389
UNCLASSIFIED
CERTIFIED IN HOMELAND SECURITY LEVEL 4 (CHS-IV) COURSE
American Board for Certification in Homeland Security
.
UNCLASSIFIED
390
TO GET YOUR ASSIGNMENTS DONE AT A CHEAPER PRICE,PLACE YOUR ORDER WITH US NOW

Leave a Reply

WPMessenger