Emergency Operations Center How-To Quick Reference Guide August 2021

Total Page:16

File Type:pdf, Size:1020Kb

Emergency Operations Center How-To Quick Reference Guide August 2021 National Incident Management System Emergency Operations Center How-To Quick Reference Guide August 2021 This page intentionally left blank Table of Contents Introduction .................................................................................................................................. 9 1. Purpose ...................................................................................................................................... 9 1.1. NIMS Compliance and Integration ................................................................................. 9 What Is an EOC? ........................................................................................................................ 10 1. Hallmarks of an EOC ............................................................................................................... 10 Preliminary Assessments .......................................................................................................... 12 1. Hazard and Vulnerability Assessment .................................................................................... 12 2. Resilience Analysis and Planning Tool ................................................................................... 12 3. Capability Assessment ............................................................................................................ 13 3.1. Interagency Coordination ............................................................................................. 13 3.2. Multiagency Coordination Groups ............................................................................... 14 3.3. Private Sector ............................................................................................................... 15 3.4. EOC Staffing Requirements and Structure Type ........................................................ 16 3.5. EOC Facility Support ..................................................................................................... 20 3.6. Plans and Procedures .................................................................................................. 20 3.7. Lifelines ......................................................................................................................... 21 Site Selection ............................................................................................................................ 22 1. General Considerations .......................................................................................................... 22 1.1. Vulnerability .................................................................................................................. 22 1.2. Central Location and Proximity to Key Personnel ...................................................... 23 1.3. Traffic Flow and Congestion ........................................................................................ 23 1.4. Accessibility .................................................................................................................. 23 1.5. Parking .......................................................................................................................... 23 1.6. Communications .......................................................................................................... 23 1.7. Security ......................................................................................................................... 24 1.8. Expandability ................................................................................................................ 24 1.9. Community-Based Design ............................................................................................ 24 3 1.10. Alternate Sites .............................................................................................................. 25 1.11. Existing EOC Sites......................................................................................................... 25 2. Mitigation Considerations ....................................................................................................... 25 2.1. Natural Hazards............................................................................................................ 25 2.2. Technological and Human-Caused Hazards ............................................................... 25 EOC Capabilities and Requirements ........................................................................................ 26 1. Determining Personnel Space Requirements ........................................................................ 26 1.1. EOC Functions .............................................................................................................. 26 1.2. Space Requirements .................................................................................................... 26 1.3. Additional Personnel Space Requirements ................................................................ 27 1.4. Sustained Operations .................................................................................................. 27 2. Communications Requirements ............................................................................................. 27 2.1. Interoperability ............................................................................................................. 27 2.2. Telecommunications (Including Teleconferencing, Videoconferencing, Text Messaging and Fax) ..................................................................................................... 28 2.3. Public Safety Radio ...................................................................................................... 28 3. IT Requirements ...................................................................................................................... 28 3.1. Internet Connectivity .................................................................................................... 29 3.2. Computer Systems ....................................................................................................... 29 3.3. Audiovisual Support ..................................................................................................... 30 4. Supplies and Equipment Requirements ................................................................................ 30 4.1. Furniture and Office Equipment .................................................................................. 30 4.2. Food Supply .................................................................................................................. 30 4.3. Medical and Sanitary Supplies .................................................................................... 30 4.4. Status and Situation Boards ........................................................................................ 30 4.5. Administrative Supplies ............................................................................................... 31 4.6. Support Services .......................................................................................................... 31 Room Design Features ............................................................................................................. 32 1. Design Considerations ............................................................................................................ 32 1.1. Basic Room Designs .................................................................................................... 32 4 1.2. Emergency Power ......................................................................................................... 33 1.3. Uninterruptible Power Supply ...................................................................................... 34 1.4. Physical Access ............................................................................................................ 34 2. Considerations for Multiuse Facilities .................................................................................... 35 2.1. Ancillary Space and Storage Areas ............................................................................. 35 2.2. Operations Room .......................................................................................................... 35 2.3. Classroom and Training Areas ..................................................................................... 35 2.4. Meeting Rooms ............................................................................................................ 35 3. Floor Plans .............................................................................................................................. 36 Information Management Systems .......................................................................................... 37 1. Information/Data Management Tools ................................................................................... 37 1.1. Geospatial Data and Analysis Capability .................................................................... 37 1.2. Crowdsourcing in Emergency Management ............................................................... 38 1.3. Hazard Prediction and Monitoring Capability ............................................................. 38 1.4. Crisis Information Management System .................................................................... 39 1.5. Personnel Qualification and Certification System ...................................................... 39 2. Infrastructure for Communications and Data Management ................................................
Recommended publications
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • Surveillant Individualism in an Era of Relentless Visibility
    International Journal of Communication 10(2016), 164–177 1932–8036/20160005 Managing Surveillance: Surveillant Individualism in an Era of Relentless Visibility SHIV GANESH1 Massey University, New Zealand Contemporary surveillance occurs in the context of communicative abundance, where visibility is not only easy but relentless: never ending, far reaching, and ceaseless. Managing surveillance therefore has considerable implications for democratic politics, workplace control, economic practices, cultural politics, and individual subjectivity. This article identifies surveillant individualism, or the pivotal role that individuals play in surveillance and countersurveillance, as a major feature of contemporary surveillance management. It seeks to clarify current research trajectories on digital surveillance management and to chart a course for organizational research on surveillant individualism. Keywords: countersurveillance, relentless visibility, sousveillance, surveillant individualism The rise of surveillance needs foremost to be contextualized with visibility as a major 21st century trope. It is not a stretch to claim that visibility is now a central concern of social and organizational theory, and scholars from multiple theoretical traditions and disciplines have traced how myriad forms of sociality and organizing have been modernized and rationalized, rendered knowable, and made transparent and accessible (Brighenti, 2007, 2010). Others have argued that the 21st century is characterized by a “new visibility,” a powerful new force facilitated
    [Show full text]
  • 7133 Trouble V4.Pdf
    HOW TO LOOK FOR TROUBLE A STRATFOR Guide to Protective Intelligence S t r at for Global Intelligence STRATFOR 700 Lavaca Street, Suite 900 Austin, Texas 78701 Copyright © 2010 by STRATFOR All rights reserved, including the right of reproduction in whole or in part Printed in the United States of America The contents of this book originally appeared as analyses on STRATFOR’s subscription Web site. ISBN: [?] EAN-13: [?] Publisher: Grant Perry Editor: Michael McCullar Project Coordinator: Robert Inks Designer: TJ Lensing COntenTs Introduction v ANoteonContent ix CHapter 1: PrinCiples and CHallengEs TheProblemoftheLoneWolf 1 TheSecretsofCountersurveillance 8 Threats,SituationalAwarenessandPerspective 14 IntelligenceasaProactiveTool 19 CounterterrorismFunding:OldFearsandCyclical Lulls 25 AQAP:ParadigmShiftsandLessonsLearned 31 Counterterrorism:Shiftingfromthe‘Who’tothe ‘How’ 39 Profiling:SketchingtheFaceofJihadism 46 CHapter 2: The Art of SurvEillance Surveillance:ForGood—andEvil 53 TheSpreadofTechnicalSurveillance 55 PhysicalSurveillance:TailingSomeoneontheMove 57 PhysicalSurveillance:TheArtofBlendingIn 60 TurningtheTablesonSurveillants 62 iii Table of Contents CHapter 3: Protecting People Bhutto’sDeath:FatalFactors 67 India:AKidnappingCaseStudy 70 China:SecurityAspectsoftheDalaiLama’sTravels 73 TheU.S.ElectionSeason:SecurityChallengesand ConventionalWisdom 75 Mexico:ExaminingtheCartelWarThrougha ProtectiveLens 80 Mexico:TacticalImplicationsoftheLabastida Killing 87 Mexico:TheThirdWar 89 CHapter 4: SafegUaRding Places CorporateSecurity:TheTechnologyCrutch
    [Show full text]
  • National Incident Management System: Intelligence/Investigations
    NATIONAL INCIDENT MANAGEMENT SYSTEM Intelligence/Investigations Function Guidance and Field Operations Guide October 2013 NIMS: Intelligence/Investigations Function Guidance and Field Operations Guide Table of Contents Intelligence/Investigations Function Guidance ................................................................ 1 Introduction.................................................................................................................................... 3 Intelligence/Investigations Function ............................................................................................ 7 Use and Organization of Groups .................................................................................................. 8 Use and Organization of Branches ............................................................................................... 9 Summary ...................................................................................................................................... 10 Intelligence/Investigations Function Field Operations Guide ....................................... 11 Intelligence/Investigations Functional Overview ...................................................................... 12 Groups and Structure within the Intelligence/Investigations Section .................................... 19 List of Abbreviations and Glossary of Key Terms ......................................................... 31 List of Abbreviations ..................................................................................................................
    [Show full text]
  • MCWP 2-14 Counterintelligence CI Support to the Combat Service Support Element and Rear Area Operations
    MCWP 2-14 Counterintelligence U.S. Marine Corps 5 September 2000 PCN 143 000084 00 To Our Readers Changes: Readers of this publication are encouraged to submit suggestions and changes that will improve it. Recommendations may be sent directly to Commanding General, Marine Corps Combat Development Command, Doctrine Division (C 42), 3300 Russell Road, Suite 318A, Quantico, VA 22134-5021 or by fax to 703-784-2917 (DSN 278-2917) or by E-mail to [email protected]. Recommendations should include the following information: l Location of change Publication number and title Current page number Paragraph number (if applicable) Line number Figure or table number (if applicable) l Nature of change Add, delete Proposed new text, preferably double-spaced and typewritten l Justification and/or source of change Additional copies: A printed copy of this publication may be obtained from Marine Corps Logistics Base, Albany, GA 31704-5001, by following the instructions in MCBul 5600, Marine Corps Doctrinal Publications Status. An electronic copy may be obtained from the Doctrine Division, MCCDC, world wide web home page which is found at the following uni- versal reference locator: http://www.doctrine.usmc.mil. Unless otherwise stated, whenever the masculine gender is used, both men and women are included. DEPARTMENT OF THE NAVY Headquarters United States Marine Corps Washington, D.C. 20380-1775 5 September 2000 FOREWORD Marine Corps Doctrinal Publication (MCDP) 2, Intelligence, and Marine Corps Warfighting Publication (MCWP) 2-1, Intelligence Operations, provide the doctrine and higher order tactics, techniques, and procedures for intelligence operations. MCWP 2-14, Counterintelligence, complements and expands on this information by detailing doctrine, tactics, techniques, and procedures for the conduct of counterintelligence (CI) operations in support of the Marine air- ground task force (MAGTF).
    [Show full text]
  • Tactical Deception (TAC-D) Policy (Including Camouflage, Countersurveillance, and Concealment)
    Army Regulation 525–21 Military Operations Tactical Deception (TAC–D) Policy (Including Camouflage, Countersurveillance, and Concealment) Headquarters Department of the Army Washington, DC 15 June 1982 UNCLASSIFIED SUMMARY of CHANGE AR 525–21 Tactical Deception (TAC–D) Policy (Including Camouflage, Countersurveillance, and Concealment) This regulation-- o Sets forth the Army’s tactical deception (TAC-D) policy; o Describes the role of TAC-D in combat operations, and identifies objectives and assigns responsibilities for TAC-D. Headquarters Army Regulation 525–21 Department of the Army Washington, DC 15 June 1982 Effective 15 July 1982 Military Operations Tactical Deception (TAC–D) Policy (Including Camouflage, Countersurveillance, and Concealment) assigned operational missions effectively copy of each to the next higher headquar- in all elements of the US Army. ters. Applicability. This regulation applies to t h e A c t i v e A r m y , t h e A r m y N a t i o n a l I n t e r i m c h a n g e s . I n t e r i m c h a n g e s t o Guard (ARNG), and the US Army Re- this regulation are not official unless they serve (USAR). are authenticated by The Adjutant Gener- Proponent and exception authority. al. Users will destroy interim changes on The proponent agency for this regulation their expiration dates unless sooner super- is the Office of the Deputy Chief of Staff seded or rescinded. for Operations and Plans. Army management control process. Suggested Improvements. Users are This regulation contains management con- invited to send comments and suggested trol provisions but does not identify key improvements on DA Form 2028 (Recom- management controls that must be evalu- m e n d e d C h a n g e s t o P u b l i c a t i o n s a n d ated.
    [Show full text]
  • US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Félix Tréguer
    US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Félix Tréguer To cite this version: Félix Tréguer. US Technology Companies and State Surveillance in the Post-Snowden Context: Be- tween Cooperation and Resistance. [Research Report] CERI. 2018. halshs-01865140 HAL Id: halshs-01865140 https://halshs.archives-ouvertes.fr/halshs-01865140 Submitted on 30 Aug 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License UTIC Deliverable 5 US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Author: Félix Tréguer (CERI-SciencesPo) 1 tech Executive Summary This deliverable looks at the growing hybridization between public and private actors in the field of communications surveillance for national security purposes. Focusing on US-based multinationals dominating the digital economy globally which became embroiled in the post-Snowden debates (companies like Google, Apple, Facebook, Microsoft, Yahoo), the report aims at understanding the impact of the Snowden scandal on the strategies of these companies in relation to state Internet surveillance. To that end, the report identifies seven factors that are likely to influence the stance of a given company and its evolution depending on the changing context and constraints that it faces across time and space.
    [Show full text]
  • Chapter 19 * September 2008
    DoD2B 7000.14-R Financial Management Regulation Volume 2B, Chapter 19 * September 2008 VOLUME 2B, CHAPTER 19: “OTHER SPECIAL ANALYSES” SUMMARY OF MAJOR CHANGES All changes are denoted by blue font. Substantive revisions are denoted by an * symbol preceding the section, paragraph, table, or figure that includes the revision. Unless otherwise noted, chapters referenced are contained in this volume. Hyperlinks are denoted by bold, italic, blue, and underlined font. The previous version dated July 2007 is archived. PARAGRAPH EXPLANATION OF CHANGE/REVISION PURPOSE Overall Formatting and room location changes. Refresh 19-76 Removed Troop Strength column from PB-18. Update Update PB-28 Exhibit to included manpower, education and 19-90/91 Update training. Update PB-28 Exhibit to include Environmental Management 19-92/93 Update Systems. 19-1 DoD2B 7000.14-R Financial Management Regulation Volume 2B, Chapter 19 * September 2008 Table of Contents VOLUME 2B, CHAPTER 19. “OTHER SPECIAL ANALYSES .....................................................1 1901 GENERAL ..................................................................................................................................5 190101. Purpose………………………………………………………………………………...5 190102. Submission Requirements………………………………………………………….….5 190103. Preparation of Material………………………………………………………………..5 190104. References…..………………………………………………………………………....5 1902 COMBATING TERRORISM .....................................................................................................6 190201. Purpose………………………………………………………………………………...6
    [Show full text]
  • CHRISTOPHER (CHRIS) POWELL Executive Leadership and Proven Operations Management Lufkin, TX 75904 [email protected] 9366450886
    CHRISTOPHER (CHRIS) POWELL Executive Leadership and Proven Operations Management Lufkin, TX 75904 [email protected] 9366450886 I am a retired US Army combat veteran with a proven and respected record of Senior Leadership and Operations Management; expert counterintelligence, security, and reconnaissance. As a Senior Leader and Operations Manager, I maintained responsibility for the assessment and selection process of new hires, fiscal year budget, mentorship and training program, as well as operational advisement to the executive leadership. While balancing effectiveness and efficiency, I sustained the operational tempo of more than 40 counterintelligence agents and their direct support to combat operations and investigations worldwide. As a Senior Counterintelligence Special Agent, the focus was directed at insider threat neutralization and education, counterespionage, and counterterrorism operations, as well as threat, vulnerability, and damage assessments. Furthermore, I required in-depth knowledge of counterintelligence analysis, signature reduction, counterintelligence screening and vetting, operational security measures (up to and including Special Access Programs), surveillance, countersurveillance, elicitation, and reconnaissance. #readytowork Authorized to work in the US for any employer WORK EXPERIENCE Recruitment Operations Officer | Enrollment & Scholarship Advisor Stephen F. Austin State University, Department of Military Assignment - Nacogdoches, TX May 2020 to Present • Identifies, assesses, and selects of
    [Show full text]
  • CFATS Risk-Based Performance Standards
    Risk-Based Performance Standards Guidance Chemical Facility Anti-Terrorism Standards May 2009 Department of Homeland Security Office of Infrastructure Protection Infrastructure Security Compliance Division Mail Stop 8100 Washington, DC 20528 Website: www.dhs.gov/chemicalsecurity 2 Note: This document is a “guidance document” and does not establish any legally enforceable requirements. All security measures, practices, and metrics contained herein simply are possible, nonexclusive examples for facilities to consider as part of their overall strategy to address the risk-based performance standards under the Chemical Facility Anti Terrorism Standards and are not prerequisites to regulatory compliance. Table of Contents Disclaimer Notice............................................................................................................................. 7 Overview.......................................................................................................................................... 8 Inquiries on RBPS Guidance or Other CFATS Issues..................................................................... 9 CFATS Risk-Based Performance Standards ...................................................................................... 10 How to Use this Guidance Document ............................................................................................ 13 General Considerations for Selecting Security Measures to Comply with CFATS...............................................................................................................................
    [Show full text]
  • The Evolution of Cyber Intelligence
    Association of Former Intelligence Officers 7700 Leesburg Pike Ste 324 Falls Church, Virginia 22043 From AFIO's The Intelligencer Web: www.afio.com , E-mail: [email protected] Journal of U.S. Intelligence Studies Volume 21 • Number 1 • $15 single copy price Winter 2014-15 by several people simultaneously, often from remote locations using modems2 over telephone lines. As this occurred, cyber efforts broadened to include modem intercepts and techniques for stealing passwords to gain access to the systems. Guide to the Study of Intelligence During the 1980s, as computers started to be connected into networks, access to each computer was granted to a much wider community, often A Guide to Cyber Intelligence worldwide. This presented new opportunities to intelligence services for clandestinely accessing com- puters remotely via a network. An early example was by Douglas R. Price the KGB-sponsored German hackers who penetrated several hundred computer systems connected to the US Military’s MILNET networks.3 The Evolution of Cyber Intelligence Another event that occurred during the 1980s and greatly affected the world of cyber espionage was the omputers came into widespread use in the introduction of the personal computer (PC). IBM intro- late 1960s and were used typically for large duced their floppy disk-based PC in 1981, followed by scientific studies, military planning, and large the PC XT in 1983, which came with a hard disk drive. C Intel introduced the 32-bit 386 microprocessor in 1985, scale business applications, such as personnel records, payroll, accounting, and data storage. Since such and a number of vendors cropped up to produce a computers often contained information of interest wide variety of “IBM compatible” personal computer they became an intelligence target.
    [Show full text]
  • A Counterintelligence Reader, Volume 4 Chapter 3
    CHAPTER 3 INTRODUCTION In its 1998 report entitled “Technology Collection Spying by other nations within the United States Trends in the US Defense Industry,” the Defense also came to the surface during this period. The Security Agency (DSS) reported that the number of most notable of which was Cuba when it suffered suspected industrial intelligence-gathering attempts setbacks with the arrest of seven members of its against the US defense industry tripled since Wasp Spy network in Florida, its spy within the US 1995. It also said that 37 nations were engaged in Defense Intelligence Agency, and another in the US industrial espionage to gain information about US Customs Service. Five Americans were also arrested Department of Defense technology. In its 2001 for selling or trying to sell US classifi ed information report, the number of countries had grown to 63. to foreign intelligence services or nations. While the DSS study focused on foreign Collection by the National Security Agency (NSA) collection of classifi ed or sensitive information came under the foreign microscope when the on US weapons systems, emerging technologies European Parliament alleged that NSA operates an with military applications, and related technical international SIGINT collection effort—identifi ed methods, intelligence collection against US as ECHELON—that intercepts communications economic, commercial, and proprietary information worldwide to provide economic intelligence to continues vigorously. This collection effort allows US corporations. On 5 July 2000, the European foreign nations and corporations to obtain shortcuts Parliament voted to launch a further investigation to industrial development and to improve their of ECHELON; the resultant draft report on competitiveness against US corporations in the ECHELON was made public on 18 May 2001.
    [Show full text]