Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
National Security Emergencies

National Security Emergencies

Ratings: (0)|Views: 4 |Likes:
Published by danmiclovan

More info:

Published by: danmiclovan on Nov 27, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/14/2013

pdf

text

original

 
EDERAL 
E
MERGENCY 
M
 ANAGEMENT 
GENCY 
ARE YOU READY?
83
NationalSecurityEmergencies
I
n addition to the natural and tech-nological hazards described in thispublication, Americans face threatsposed by hostile governments or extremist groups. These threats to national security include acts of terrorism and acts of war. The following is general information about national security emergencies. For moreinformation about how to prepare for them, including volunteering in a CitizenCorps program, see the “For More Infor-mation” chapter at the end of this guide.
Terrorism
 T 
errorism is the use of force or violenceagainst persons or property in viola-tion of the criminal laws of the UnitedStates for purposes of intimidation,coercion or ransom. Terrorists often usethreats to create fear among the public, totry to convince citizens that their govern-ment is powerless to prevent terrorism,and to get immediate publicity for their causes. Acts of terrorism range from threats of terrorism, assassinations, kidnappings,hijackings, bomb scares and bombings,cyber attacks (computer-based), to theuse of chemical, biological and nuclear  weapons.High-risk targets include military andcivilian government facilities, internationalairports, large cities and high-prole land-marks. Terrorists might also target largepublic gatherings, water and food supplies,utilities, and corporate centers. Further,they are capable of spreading fear by send-ing explosives or chemical and biologicalagents through the mail.In the immediate area of a terrorist event, you would need to rely on police, re andother ofcials for instructions. However, you can prepare in much the same way  you would prepare for other crisis events.
Preparing for terrorism
1. Wherever you are, be aware of your surroundings. The very nature of terrorism suggests there may be littleor no warning.2. Take precautions when traveling. Beaware of conspicuous or unusual be-havior. Do not accept packages fromstrangers. Do not leave luggage unat-tended. Unusual behavior, suspiciouspackages and strange devices should be promptly reported to the police or security personnel.3. Do not be afraid to move or leave if youfeel uncomfortable or if something doesnot seem right.
 
84
ARE YOU READY?
EDERAL 
E
MERGENCY 
M
 ANAGEMENT 
GENCY 
4. Learn where emergency exits are lo-cated in buildings you frequent. No-tice where exits are when you enter unfamiliar buildings. Plan how to get out of a building, subway or congestedpublic area or trafc. Note wherestaircases are located. Notice heavy or  breakable objects that could move, fallor break in an explosion.5. Assemble a disaster supply kit at home and learn rst aid. Separate thesupplies you would take if you had toevacuate quickly, and put them in a  backpack or container, ready to go.6. Be familiar with different types of reextinguishers and how to locate them.Know the location and availability of hard hats in buildings in which youspend a lot of time. 
Protection against cyber attacks
Cyber attacks target computer or tele-communication networks of critical infra-structures such as power systems, trafccontrol systems, or nancial systems.Cyber attacks target information tech-nologies (IT) in three different ways. First,is a direct attack against an informationsystem “through the wires” alone (hack-ing). Second, the attack can be a physicalassault against a critical IT element. Third,the attack can be from the inside as a re-sult of compromising a trusted party withaccess to the system.1. Be prepared to do without services younormally depend on that could be dis-rupted—electricity, telephone, naturalgas, gasoline pumps, cash registers, ATM machines, and internet transac-tions.2. Be prepared to respond to ofcialinstructions if a cyber attack triggersother hazards, for example, generalevacuation, evacuation to shelter, or shelter-in-place, because of hazardousmaterials releases, nuclear power plant incident, dam or ood control systemfailures.
Preparing for abuilding explosion
Explosions can collapse buildings andcause res. People who live or work in multi-level building can do the following:1. Review emergency evacuation proce-dures. Know where emergency exitsare located.2. Keep re extinguishers in workingorder. Know where they are located,and learn how to use them.3. Learn rst aid. Contact the local chap-ter of the American Red Cross for infor-mation and training.4. Building owners should keep thefollowing items in a designated placeon each oor of the building.• Portable, battery-operated radio andextra batteries• Several ashlights and extra batteries• First aid kit and manual• Several hard hats• Fluorescent tape to rope off dan-gerous areas
Bomb threats
If you receive a bomb threat, get as muchinformation from the caller as possible.Keep the caller on the line and recordeverything that is said. Then notify thepolice and the building management.If you are notied of a bomb threat, do not touch any suspicious packages. Clear thearea around suspicious packages and no-tify the police immediately. In evacuatinga building, don’t stand in front of windows,
 
EDERAL 
E
MERGENCY 
M
 ANAGEMENT 
GENCY 
ARE YOU READY?
85
glass doors or other potentially hazardousareas. Do not block sidewalk or streets to be used by emergency ofcials or othersstill exiting the building.
Suspicious parcels and letters
Be wary of suspicious packages and let-ters. They can contain explosives, chemi-cal or biological agents. Be particularly cautious at your place of employment.Some typical characteristics postal inspec-tors have detected over the years, which ought to trigger suspicion, include parcelsthat— Are unexpected or fromsomeone unfamiliar to you.Have no return address, or have one that can’t be veri-ed as legitimate.Are marked with restric-tive endorsements, such as“Personal,” “Condential”or “Do not x-ray.”Have protruding wires or aluminum foil, strange odors or stains.Show a city or state in the postmark that doesn’t match the return address.Are of unusual weight, given their size,or are lopsided or oddly shaped.Are marked with any threateninglanguage.Have inappropriate or unusual labeling.Have excessive postage or excessivepackaging material such as maskingtape and string.Have misspellings of common words.Are addressed to someone no longer  with your organization or are otherwiseoutdated.Have incorrect titles or title without a name.Are not addressed to a specic person.Have handwritten or poorly typedaddresses. With suspicious envelopes and packagesother than those that might contain explo-sives, take these additional steps against possible biological and chemical agents.Refrain from eating or drinking in designated mail handling area.Place suspicious envelopes or packagesin a plastic bag or some other type of container to prevent leakage of contents. Never sniff or smell suspect mail.If you do not have a con-tainer, then cover the envelopeor package with anythingavailable (e.g., clothing, paper,trash can, etc.) and do not remove the cover.Leave the room and closethe door, or section off thearea to prevent others fromentering.Wash your hands with soap and water 
 
to prevent spreading any powder to your face.If you are at work, report the incident to your building security ofcial or anavailable supervisor, who should notify police and other authorities without delay.List all people who were in the roomor area when this suspicious letter or package was recognized. Give a copy of this list to both the local publichealth authorities and law enforcement ofcials for follow-up investigations andadvice.If you are at home, report the incident to local police.
In the immediatearea of aterrorist event,leave quickly and orderly.Listen to police,re, and other ofcials for instructions.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->