chap 14 Flashcards

1
Q

CHAPTER 14 TITLE

A

TERRORISM PREPAREDNESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Nearly every American resident is touched, appalled, and angered by the tragedies. The common thread is terrorism. The constant theme is violence, destruction of property, and loss of life.

Each attack has taken terrorism to a new level in terms of audacity, mayhem, cost, and human suffering.

Terrorists have access to as much information and know as much about our vulnerabilities; they have been studying our weaknesses.

Schools have suffered in recent years, with students turning on their employers, their teachers, and their peers with acts of mayhem and violence. From sniper attacks to confrontational shootings.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

● Many companies address bomb threats or even worker unrest, as in strikes or walkouts.
● Companies are also expanding their programs to incorporate terrorism and acts of subversion within the company.
● New architecture, building plans, and company activities are viewed in light of potential adverse effects of terrorist activities.

A

RESPONSIBILITIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

● The approach to terrorism is similar to that of other safety problems. First is consideration of vulnerabilities and probabilities of attack. Determine whether your company or other similar companies have faced terrorist problems in the past. History may repeat itself.

A

PLANNING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACTIVITIES
● What activities take place that might be attractive to a terrorist group? Ask if your company manufactures or maintains inventories of any products that could conceivably be turned into weapons or agents of destruction.
● It is obvious that seemingly innocuous items intended for useful activities can be turned against the company or others for terrorist purposes.
● Chemicals in large quantities–explosives, fertilizers, pesticides, herbicides, fuels, energy sources, poisons–or mechanical devices are just a few of the items requiring careful guarding. follow processes from beginning to end and identify easy or high-risk targets. Work toward protecting them first.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

● Manufacturers of food products, drugs, cosmetics, or other items of mass consumption are potential targets.
● Carefully assess vulnerability to determine how the product could be contaminated or altered to pose a threat to a large portion of the population.
● If a company hosts events or maintains facilities with large gatherings of customers or even employees it could be considered a target, even the name of the company.

A

PRODUCTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

● Look at the areas of operation in your facility that might act as bottlenecks in the event of attack.
● Consider any chemicals, products, or items in your facility that might be used against your company or others.
● Once you’ve looked at how you may be vulnerable, your next step is to find where. Assess your weakest points.

A

BOTTLENECKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

● Terrorists planning to affect large numbers of people may well prefer to be in a more populated area for maximum effect.
● Are you in a high-profile area likely to be targeted?
● Downtown, airport, and tourist destinations have been targeted in the past.
● Is your location easily accessible by vehicular or even pedestrian traffic?
● Can you keep intruders at a distance from your facilities via fences or other barriers?

A

LOCATION OF YOUR PROPERTY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

● Protecting the perimeter is relatively easy and inexpensive.
● Once the perpetrator is inside the facility, the capacity to inflict harm increases dramatically.
● Consider the likelihood a perpetrator would want to come into the facility by crashing through or climbing a fence and plan accordingly.

A

FENCES AND ENTRANCES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

● Shrubbery, walls, and sculptures may all become potential hiding places for intruders or explosives.
● Consider keeping a clear area extending to a specific distance around each building.
● Don’t give intruders a place to hide themselves or explosives.

A

CLEAR AREA AROUND THE PREMISES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

● Doors, windows, and other openings into the property should be secured and possibly alarmed.
● Technology permits us to know any time a building is penetrated. Check them all, including those on the roof.
● Guard or alarm them to repel access by outsiders

A

DOORS , WINDOWS , AND OTHER OPENINGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

● Ventilation and HVAC systems can be used as points of penetration or as delivery mechanisms for chemicals, including gases
● All parts of these systems should be located behind fences or out of reach and secured.

A

VENTILATION AND HVAC SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

● Lighting by itself is a deterrent to some intruders. Poor planning with lighting can cause shaded areas that provide more cover for intruders than no lighting at all.
● Consider removing or lowering obstructions that cast enough shade for intruders to hide.
● If they cannot be removed or lowered, add lighting to illuminate the shaded areas they provide.

A

LIGHTING SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

● Any communication systems used should be tamper proof to the extent possible.
● Utilize all communication systems in day-to-day activities to maximize their effectiveness, ensure systems will operate in times of emergency, and familiarize employees with their use.

A

COMMUNICATION SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

● Technology enables unguarded areas to become virtually impossible to enter undetected.
● Even moderately sophisticated security systems cannot be disabled or disarmed without sending out an alarm.
● Even fences can be enabled to send an alert if any intruder attempts to get close to, cut, climb, or get through them in any way.
● Pressure systems determine an intruder’s presence and detectors prevent unnoticed cutting or climbing

A

SECURITY SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

● Surveillance systems can be triggered anytime there is movement at any specified level.
● Sensitivity settings can be adjusted to ignore dogs or other small creatures but to detect human entrance.
● Cameras record all movements of people on the premises and can easily be connected to a server for 24-hour Internet access.

A

SURVEILLANCE SYSTEMS

17
Q

● Guards and sentries are needed when mechanical or electronic surveillance devices are inadequate.
● Animals may provide an adequate level of security, and systems can be adjusted so animals do not trigger them.
● Guards must be continually trained and notified of specific threats.

A

GUARDS AND SENTRIES

18
Q

● A pass system may be initiated to check all entrants to the premises.
● Visitors can be screened by checking identification cards or prearranged passes. ● Employees may also be required to carry
identification cards or to wear badges.

A

ENTRY AND MOVEMENT OF VEHICLES AND VISITORS

19
Q

● Check the credentials and backgrounds of all new employees. This is standard practice under any circumstances but even more so if the facility is subject to terrorist attack.
● Carefully review records and references. Long, unaccounted-for time periods are important, so find out why potential employees have large gaps in their employment history and work to verify their accounts of them.

A

ENTRY AND MOVEMENT OF EMPLOYEES

20
Q

● Sensitive data, vulnerabilities, access points, and other critical information are frequently stored on accessible computers.
● Consider implementing the use of a firewall to help prevent outsiders from roaming through your system.

A

COMPUTERS AND NETWORKS

21
Q

● Terrorist threats may come indirectly via alerts received in the news media as disseminated by the FBI or Homeland Security.
● They may also come directly as bomb threats or other threatened hostilities aimed at disrupting company operations.
● Threats need to be taken seriously, in the heat of a terrorist disaster or even a threat, it may be difficult to make wise decisions.
● It may be safer to stay inside than to move outside the building.
● A threat may, in fact, be designed to lure workers or a particular employee outside the building for malevolent reasons.

A

THREATS

22
Q

● Procedures for handling of mail and packages help lessen the possibility that bombs or toxic substances can be delivered to the mail-room and disseminated.
● Mailrooms should always be located on the perimeter of the building so, in the unlikely event of an explosion or contamination, damage can be limited.

A

MAIL AND PACKAGES

23
Q

● Advise management of the risks your company faces.
● Prepare a plan to deal with threats and acts of terrorism. In most cases they are instructed to evacuate.
● Thought must be given as to how and where they will move.

A

YOUR ROLE

24
Q

● The last approach to any loss control problem is insurance.
● Companies purchase insurance in case all efforts at loss prevention or control fail.
● Companies may be forced to negotiate
with insurance carriers in agreeing to take certain precautionary measures resulting in higher standards of prevention efforts in return for coverage.
● The alternative may be no coverage or very limited coverage.

A

INSURANCE

25
Q

There is no way to absolutely eliminate the risks faced with terrorism. As with all forms of safety, the goal is to minimize exposure.

A