Student Introductions NameAffiliationArea of ConcentrationCourse Expectations Text Box: Purpose of Course and FEMA 426 Manual Course Goal U.S. AIR FORCE FEMA To enhance student understanding of the measures and technology available to reduce risk from terrorist attack. Course Objectives Students will be able to: 1.Explainthe basic components of the assessment methodology. 2.Appreciatethe different assessment methodology approaches that can be used. 3.Performan assessment for a building by identifying and prioritizing assets, threats, and vulnerabilities and calculating relative risk. Course Objectives 4.Identifyavailable mitigation measures applicable to the site and building envelope. 5.Understandthe technology limitations and application details of mitigation measures for terrorist tactics and technological accidents. 6.Performan assessment for a given building by identifying vulnerabilities using the Building Vulnerability Assessment Checklist in FEMA 426. Course Objectives 7.Selectapplicable mitigation measures and prioritize them based upon the final assessment risk values. 8.Appreciatethat designing a building to mitigate terrorist attacks can create conflicts with other design requirements. Course Overview –Day 1 Unit I –Introduction and Course Overview Unit II –Asset Value Assessment Unit III –Threat / Hazard Assessment Unit IV –Vulnerability Assessment Unit V –Risk Assessment / Risk Management Course Overview –Day 2 Unit VI –FEMA 452 Risk Assessment Database Unit VII –Explosive Blast Unit VIII –Chemical, Biological, and Radiological (CBR) Measures Exam and Exam Review Unit IX –Site and Layout Design Guidance Course Overview –Day 3 Unit X –Building Design Guidance Unit XI –Electronic Security Systems Unit XII –Finalization of Case Study Results Unit XIII–Course Wrap-up Course Materials FEMA Publication 426 Reference Manual toMitigate Potential Terrorist Attacks Against Buildings FEMA Publication 452 Risk Assessment: A How-To Guide to Mitigate Potential Terrorist Threats Against Buildings FEMA 426 Reference Manual Chapter 1–Asset Value, Threat/Hazard, Vulnerability, and Risk Chapter 2 –Site and Layout Design Guidance Chapter 3 –Building Design Guidance Chapter 4 –Explosive Blast Chapter 5 –CBR Measures FEMA 426 Reference Manual Appendix A –Acronyms Appendix B –General Glossary Appendix C –CBR Glossary Appendix D –Electronic Security Systems Appendix E –Bibliography Appendix F –Associations and Organizations FEMA 426 –Chapter 1 •Asset Value Assessment•Threat/Hazard Assessment•Vulnerability Assessment•Risk Assessment•Risk Management•Building Vulnerability Assessment Checklist Text Box: FEMA 426, Figure 1-3: The Assessment Process Model, p. 1-5 FEMA 426 –Chapter 2 Site and Layout Design •Layout Design •Siting •Entry Control/Vehicle Access •Signage •Parking •Loading Docks •Physical Security Lighting •Site Utilities FEMA 426 –Chapter 3 Building Design Guidance •Architectural •Building Structural and Nonstructural Considerations •Building Envelope considerations •Other Building Design Issues •Building Mitigation Measures FEMA 426, Figure 1-10: Non-Redundant Critical Functions Collocated Near Loading Dock, p. 1-41 FEMA 426 –Chapter 4 Explosive Blast •Building Damage •Blast Effects and Predictions •Stand-off Distance •Progressive Collapse FEMA 426 –Chapter 5 CBR Measures •Evacuation •Sheltering in Place •Personal Protective Equipment •Filtering and Pressurization •Exhausting and Purging FEMA 452 Risk Assessment How-To Step 1 –Threat Identification and Rating Step 2 –Asset Value Assessment Step 3 –Vulnerability Assessment Step 4 –Risk Assessment Step 5 –Consider Mitigation Options FEMA 452 Risk Assessment How-To Appendix A –Building Vulnerability Assessment Checklist Appendix B1 –Risk Management Database v1.0: Assessor's User Guide Appendix B2 –Risk Management Database v1.0: Database Administrator's User Guide Appendix B3 –Risk Management Database v1.0: Manager's User Guide Appendix C –Acronyms and Abbreviations Summary FEMA 426 and 452 are intended for building sciences professionals. Manmade hazards risk assessments use a “Design Basis Threat.” Site and building systems and infrastructure protection are provided by layers of defense. Multiple mitigation options and techniques. Use cost-effective multihazard analysis and design. Case Study Activities In small group settings, apply concepts introduced in the course. Become conversant with contents and organization of FEMA 426. HAZARDVILLE INFORMATION COMPANY (HIC) Text Box: Case Study Small IT / Communications / Data Center Company Occupies portion of building rented in Suburban Office Park Data center and communications for off-site clients Hazardville Information Company (HIC) Hazardville Information Company Mission Regional Computer Center ..Real-time IT support ..Backup services ..24 x 7 operations Customers ..Government and commercial ..Some classified work Layout ..Downstairs: Computers, Communications, Staff ..Upstairs: Executive offices ..Loading dock, Storage Threat Analysis Terrorist Threat Intelligence Threat Criminal Threat FEMA 426, Figure 2-1: An Example of Using GIS to Identify Adjacent Hazards, p. 2-5 HIC Hazard Analysis HazMat ..Facilities ..Highway ..Rail Liquid Fuels Air Traffic Natural Hazards HAZMATS- R-USHAZMATS- R-USHAZMATS- R-USHAZMATS- R-US Computerized Elevation Looking Northwest Computerized Elevation Looking Northeast Building Data Building Structure Mechanical Systems Gas MeterUnder StairsLoading DockGas Meter Under Loading Dock Stairs Electrical Systems Physical Security IT Systems Emergency Response Source: Mine Safety Appliances Company Design Basis Threat Explosive Blast:Car Bomb 250 lb TNT equivalent. Truck Bomb 5,000 lb TNT equivalent (Murrah Federal Building class weapon) Chemical:Large quantity gasoline spill and toxic plume from the adjacent tank farm, small quantity (tanker truck and rail car size) spills of HazMat materials (chlorine) Biological:Anthrax delivered by mail or in packages, smallpox distributed by spray mechanism mounted on truck or aircraft in metropolitan area Radiological:Small “dirty”bomb detonation within the 10-mile radius of the HIC building Design Basis Threat Criminal Activity/Armed Attack: High powered rifle or handgun exterior shooting (sniper attack or direct assault on key staff, damage to infrastructure [e.g., transformers, chillers, etc.]) Cyber Attack:Focus on IT and building systems infrastructure (SCADA, alarms, etc.) accessible via Internet access Levels of Protection and Layers of Defense Levels of Protection for Buildings ..GSA Interagency Security Criteria Level II Building ..DoD Low Inhabited Building Elements of the Layers of Defense Strategy ..Deter ..Detect ..Deny ..Devalue Summary FEMA Publication 426 Reference Manual toMitigate Potential Terrorist Attacks Against Buildings FEMA Publication 452 Risk Assessment: A How-To Guide to Mitigate Potential Terrorist Threats Against Buildings Unit I Case Study Activity Introduction and Overview Background Emphasis: ..Refamiliarize yourself with Appendix S, Case Study ..Get acquainted with FEMA 426 Requirements Refer to Case Study and, as a team, answer worksheet questions Use Case Study data to answer worksheet questions ..Ask instructors any clarifying questions based upon your experience