Geoscience Reference
In-Depth Information
Planning and Preparation
Emergency Managers typically are not responsible for counterterrorism actions or
investigations. These roles are primarily law enforcement responsibilities. This is
particularly the case because all terrorist acts are considered criminal acts. However,
the Emergency Manager does have a role in preparing the public and for conse-
quence management following an act of terrorism. Information that the Emergency
Manager can use in preparing the public is typically covered under other hazards
that the public should be prepared for. For example, in the case of a chemical
weapon being used, the same preparatory measures should be taken as if preparing
for a hazardous material event. For a biological weapon being used, the same pre-
paratory actions should be taken as if preparing for an epidemic or pandemic. The
only notable difference is the malicious and criminal intent behind the incident.
Preparing for a terrorism act is no different than preparing for other hazards. It
is important that Emergency Managers provide information on developing disaster
supplies kits, as well as information pertaining to developing a family disaster plan.
The family disaster plan should include a communications plan as well as an evacu-
ation plan and a shelter-in-place plan. Emergency Managers should ensure that
plans for Continuity of Operations (COOP), mass casualties, health care facility
surge plans, and other emergency plans are reviewed and ready for action should
a terrorist incident occur. Because of the varying nature of terrorist activities, it is
necessary that all plans be reviewed and maintained to manage the consequences
of a terrorist act.
Cyber Threats and Attacks
Description and History
As more and more of the world relies on technologies, we raise our vulnerabilities
to malicious attacks on our computer systems, including those that run our day-
to-day businesses and processes for critical infrastructure. Threats to our computer
systems can come from a variety of sources. These sources can include disgruntled
employees, malicious intruders, and even hostile governments and terrorist groups.
The following is a list of definitions used by the Department of Homeland Security
in identifying cyber threats. 24
Hackers—Individuals who break into networks for the thrill of the challenge
or for bragging rights in the hacker community. Although remote cracking
once required a fair amount of skill or computer knowledge, hackers can now
download attack scripts and protocols from the Internet and launch them
against victim sites. Thus, while attack tools have become more sophisticated,
they have also become easier to use. The worldwide population of hackers
poses a relatively high threat of an isolated or brief disruption causing serious
damage.
Search WWH ::




Custom Search