Geoscience Reference
In-Depth Information
Assure availability of adequate transportation for stockpiles of very heavy
equipment by maintaining a database of rail and barge equipment and
adapting Schnabel railcars to fit all needed types of large pieces of equip-
ment, if necessary.
Monitor domestic manufacturing capability to assure adequate repair
and manufacture of key equipment in times of emergency.
Investigate mutual aid agreements with vendors, industry associations, or
large nearby energy companies.
− Establish backup arrangements with contractors for emergency services
and other emergency support.
General Mitigation Measures to Reduce Vulnerability
Emphasize inherently less vulnerable technologies and designs when
practical, such as using standardized equipment.
− Move toward an inherently less vulnerable bulk energy system
(e.g., smaller generators near loads, local storage) as new installations are
planned and constructed.
As indicated earlier, local governments should coordinate energy facility activi-
ties related to risk management. The following questions can help guide local and
state governments through the risk management process.
Local and State Government's Role in the Risk Management Process
Has the local or state government identified any critical issues or vulner-
abilities regarding its energy infrastructure?
If the local or state government has identified critical issues, what are they
and why are they critical?
Has the local or state government developed plans to counter these
vulnerabilities?
− Has the local or state government coordinated information with other
local energy facilities, local law enforcement agencies, and others con-
cerning these vulnerabilities?
Conclusion
Vulnerability assessment methodologies generally evaluate vulnerabilities by
broadly considering the threat, existing protective measures, and consequences that
result if an asset is attacked (asset-based approach). Alternatively, multiple potential
sequences of attack events can be considered to evaluate the likelihood that the cur-
rent protective measures at a facility will be able to successfully deter, detect, and/
or delay an attack (scenario-based approach).
Search WWH ::




Custom Search