Responding to Catastrophic Events

Responding to Catastrophic Events

Author: J. Larsen

Publisher: Springer

Published: 2013-05-30

Total Pages: 397

ISBN-13: 1137336439

DOWNLOAD EBOOK

An introduction to the range of potential disaster scenarios, covering the issues and organizational relationships of importance to the student of consequence management. These include the roles, responsibilities, and coordination requirements of first responders, the Department of Homeland Security, the Department of Defense, and the military.


Consequence Management: Operational Principles for Managing the Consequence of a Catastrophic Incident Involving Chemical, Biological, Radiological, Nuclear Or High Yield Explosives

Consequence Management: Operational Principles for Managing the Consequence of a Catastrophic Incident Involving Chemical, Biological, Radiological, Nuclear Or High Yield Explosives

Author: Cbrne Consequence Response Force

Publisher: Createspace Independent Pub

Published: 2013-01-16

Total Pages: 204

ISBN-13: 9781481990820

DOWNLOAD EBOOK

To assist with a catastrophic mass casualty incident in the United States and its territories — at the direction of the President — the Chairman of the Joint Chiefs of Staff or the appropriate Combatant Commander may deploy the CBRNE Consequence Management Response Force (CCMRF). The CCMRF is trained and equipped to provide a rapid response capability following a catastrophic event. Just as with all instances of Defense Support of Civil Authorities (DSCA), military forces respond only when requested. Requests always work their way up from the local level. After a major incident, city leaders will ask for county assistance; county asks for State assistance; the State Governor asks for Federal assistance from the President. If the President agrees, a Presidential Declaration of Disaster is declared. The Secretaries of Homeland Security, Defense, and other cabinet members meet and determine the best course of action. The SecDef may initiate activation of CCMRF units. State National Guard units are usually mobilized under the direction of the Governor and remain State assets, while CCMRF units are usually Title 10 under the direction of NORTHCOM, ARNORTH, and the Joint Task Force (JTF) Commander — or the Defense Coordinating Officer (DCO) if a JTF is not stood up. The CCMRF includes assets such as medical surge, chemical decontamination and biological detection that may be helpful to the victims of a catastrophic event. The CCMRF also includes communications, force protection, transportation, supply and maintenance assets that can be used to establish command and control capabilities to facilitate additional military and civilian resources into the affected area. Joint Doctrine for Civil Support notes, “DOD resources are normally used only when state and local resources are overwhelmed and/or non-DOD resources of the Federal government are insufficient or unable to meet the requirements of local and state civil authorities.” This workbook focuses on domestic consequence management under the command of USNORTHCOM. The CCMRF mission is part of a broader Department of Defense (DOD) support package to the Lead Federal Agency (LFA), which is responsible for overall coordination of the response. The primary agency is responsible for overall coordination of the response. In many cases the primary agency is FEMA, but not always. In the case of many other emergencies the state government retains legal and operational leadership. Often, for these incidents, there is no need to establish a Joint Task Force, and the Defense Coordinating Officer remains the single point of contact for DoD. Other Federal agencies may also support the response — for example, the FBI may assist in collecting evidence — but the primary responsibility remains at the State or local level. There is also likely to be significant involvement in emergency response by local authorities, private organizations, and individual citizens. The legal, political, and operational implications can be complex. When the CCMRF is deployed, the event has overwhelmed local resources. If the event is perceived as having terrorist origins, the level of public concern will be especially high. Public concern, legal limitations, and the need to collaborate with a wide range of other players establish a challenging strategic context.


Science and Technology for Army Homeland Security

Science and Technology for Army Homeland Security

Author: National Research Council

Publisher: National Academies Press

Published: 2003-05-08

Total Pages: 184

ISBN-13: 0309087015

DOWNLOAD EBOOK

The confluence of the September 11, 2001 terrorist attack and the U.S. Army's historic role to support civil authorities has resulted in substantial new challenges for the Army. To help meet these challenges, the Assistant Secretary of the Army for Research and Technology requested the National Research Council (NRC) carry out a series of studies on how science and technology could assist the Army prepare for its role in homeland security (HLS). The NRC's Board on Army Science and Technology formed the Committee on Army Science and Technology for Homeland Security to accomplish that assignment. The Committee was asked to review relevant literature and activities, determine areas of emphasis for Army S&T in support of counter terrorism and anti-terrorism, and recommend high-payoff technologies to help the Army fulfill its mission. The Department of Defense Counter-Terrorism Technology Task Force identified four operational areas in reviewing technical proposals for HLS operations: indications and warning; denial and survivability; recovery and consequence management; and attribution and retaliation. The study sponsor asked the Committee to use these four areas as the basis for its assessment of the science and technology (S&T) that will be important for the Army's HLS role. Overall, the Committee found that: There is potential for substantial synergy between S&T work carried out by the Army for its HLS responsibilities and the development of the next generation Army, the Objective Force. The Army National Guard (ARNG) is critical to the success of the Army's HLS efforts.


Consequence Management

Consequence Management

Author: Institute of Land Warfare (Association of the United States Army)

Publisher:

Published: 2013

Total Pages: 196

ISBN-13:

DOWNLOAD EBOOK

Consequence management 1.0 is a work in progress. Audience: CCMRF commanders and staff assigned to task force operations, medical and aviation and their civilian counterparts. The workbook details the CCMRF's mission, roles and responsibilites and the core principles behind doctrin, strategy, and commander's intent.


Countering Cyber Sabotage

Countering Cyber Sabotage

Author: Andrew A. Bochman

Publisher: CRC Press

Published: 2021-01-20

Total Pages: 232

ISBN-13: 1000292975

DOWNLOAD EBOOK

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.