ࡱ> OQN 0bjbjVV .@<<(GGGGG[[[[w$[ %x($$$$$$$$&%)$G"""$GG$$$$"jGG$$"$$$$`<[P#^$v$$0 %$)#F)$)G$`X$|Z$$#" %"""") : 14th ANNUAL EMERGENCY MANAGEMENT HIGHER EDUCATION CONFERENCE June 6-9 2011 PREPARING FOR THE CHALLENGES OF EMERGENCY MANAGEMENT IN HIGHER EDUCATION TEACHING INFRASTUCTURE SECURITY WITH A PUBLIC POLICY FOCUS/MASS CASUALTY DATA MANAGEMENT SYSTEM (FROM COMPLAINT TO GRAVE) (Second breakout session of Wednesday June 8, 2011) Moderator: Arlene A. Patel, M.A. apatel@tougaloo.edu Senior Advisor to the President for Homeland Security Initiatives Tougaloo College Tougaloo, MS Panel: SGT. Mark Landahl, CEM mlandahl1@faculty.umuc.edu Frederick County Sherrifs Offics/Adjunct Professor University of Maryland University College Largo, MD Stephen S Carter  HYPERLINK "mailto:sscarter@umuc.edu" sscarter@umuc.edu Academic Director for Emergency Management and Homeland Security University of Maryland University College Largo, MD David J. Simms, GISP dsimms@pwcgov.org President and CEO, GIS Analytic Solutions, LLC. GIS Instructor, George Mason University Technical Program Analyst, Prince William County Fire and Rescue TEACHING INFRASTUCTURE SECURITY WITH A PUBLIC POLICY FOCUS/MASS CASUALTY DATA MANAGEMENT SYSTEM (FROM COMPLAINT TO GRAVE) Prepared by: Jacob J. Dickman  HYPERLINK "mailto:Jdickman2@capellauniversity.edu" Jdickman2@capellauniversity.edu Doctoral Student in Emergency Management Capella University Part 1: Teaching Infrastructure Security with a Public Policy Focus. Teaching infrastructure issues with a public policy focus is difficult because of the limited literature available on the subject. There is some publicly available literature through the Naval Postgraduate School that is in network theory and computer science but has some theoretical underpinnings in public policy. University of Maryland-University College (UMUC) has worked on developing a course involving multiple conceptual frameworks. The CIP (Critical Infrastructure Policy) framework focuses on the policy, networks, level of hazard, level of protection, and system design. UMUC was developing the course for its Emergency Management Program that has 75% of their students already working in the discipline with an average age of 32 years old. The program outcomes expected of students are: P1. Lead, manage, motivate, and develop others to establish and achieve strategic and operational homeland security goals and interface with internal and external audiences. P2. Manage technology and information for the protection, response, and recovery of critical infrastructure/information in a hostile or emergency environment. P3. Navigate public or private organizations financial, personnel, legal, and political information to identify, evaluate, and address the organizational needs, requirements, and resources. P4. Thoroughly research, critically analyze, and synthesize complex intelligence information using various methods to formulate risk assessments and responses to emerging threats. P5. Communicate, negotiate, and educate strategically and tactically across cultural boundaries with diverse audiences within homeland security. P6. Write concise and succinct policy, planning, and procedure documents for a variety of audiences to support homeland security operations. The UMUC approach to teaching is to frame infrastructure security as a political response to a specific public problem. The focus is on the political dynamic of diverse stakeholders in the development and implementation of public policy for infrastructure security and resilience. The desired outcome is that the students develop the ability to critically assess the current policy environment in order to design solutions and compare alternatives for a future of effective, efficient, responsible, and equitable infrastructure security policy. The course is titled HMLS 408, and is constructed of four content modules: Module 1 is titled Infrastructure Security in the United StatesA Historical Perspective. This module discusses what makes infrastructure critical, infrastructure security in early America: the founding of the progressive era (1770s- 1920s), infrastructure security issues in contemporary conflict: World Wars and the Cold War, and modern America: the policy response to terrorismOkalahoma City to 9/11. Module 2 is titled Critical Infrastructure ProtectionStrategy and policy in the post-9/11 era. This module covers threats to infrastructure: terrorism and beyond, including terrorism/crime, natural hazards, technological failure, human error, cyber threats, and deterioration. This module also covers infrastructure security: post-9/11 U.S. strategy and policy to include legislative actions and executive policy (HSPD-7/NIPP, Strategy Documents etc). Module 3 is titled Managing riskAssessment and Countermeasures. This module covers varying methodologies of risk management tools. It should be pointed out here that there is no specific methodology touted over any other one, rather it is stressed to pick one methodology and stick with it. This module also covers assessing the risk to facilities: utilizing the FEMA Risk Assessment Process, and minimizing risk: redundancy and security countermeasures. Module 4 is titled Infrastructure SecurityContinuing Challenges. This module covers infrastructure and security challenges including the size and scope of infrastructure sectors, information sharing, interdependencies, balancing public and private concerns such as regulation vs. market solutions, methodology, terrorism vs. all hazards approach, and federalism. International issues are discussed as well along with a cargo security case study. This course is designed to cover 3 out of the 10 EM core competencies: #2Administrative, Management, Public Policy Knowledge, Skills, and Principles. #6Subject Matter Knowledge, Skills, and AbilitiesTheory, Principles, and Fundamentals of Hazards and Disasters. #8Technical Skills and Standards. Part 2: Mass Casualty Data Management System (From Complaint to Grave). Through technology, we now have the ability to track multiple resources from multiple locations in many disciplines in the event of a disaster or mass casualty. This is a case study on how Prince William County, Va. has integrated a GIS system to analyze and map data to track patients from illness onset through the expiration of life. Prince William County, Va. Is located 35 miles southwest of Washington DC. It covers 348 square miles with an estimated population of 379,577 people. The two largest independent cities within the county are Manasses and Manasses Park. The combined populations are estimated at over 400,000 people. The county falls within the Metropolitan Washington COG Jurisdictions. A look at some recent incidents that show the need for patient tracking where technology would be very helpful can start with the 1995 sarin gas incident in Tokyo, Japan. Depending on what resource you look at, the number of people who were ill and needed treatment was over 600. Many left the scene on their own and later showed up at hospitals or clinics. It was very difficult for the authorities to know data such as bed availability or where people were. GIS systems could have made the incident much easier to handle. Other incidents a bit closer to home were the 2001 attacks on Northern Va. And the subsequent Anthrax attacks on various politicians and news media persons. Since September 11th, 2001 much has changed in the field of mass casualty planning. The Department of Homeland Security has been created. Our concerns have gone from terrorism to an all hazards approach, to include pandemic influenza and natural disasters. We have a greater acceptance of the potential for mass fatalities and we recognize there may be extended events where tracking people is critical. Some of the challenges in planning for these events are the differences in the types of events. There are WMD events, terrorism events, and pandemic planning. There is also system overload to consider. There are the Continuity of Government plans, the Continuity of Operations plans, the governments responsibilities and the publics expectations that must be dealt with. There are existing plans in place that can be incorporated into the GIS system. There are mass casualty medical and trauma plans, the SNS (Strategic National Stockpile) plan, the Cities Readiness Initiative, Points of Delivery (POD) plans, and mass immunization plans for influenza and smallpox vaccines. All of the plans need several common components. There is the central collection of data, key data elements, multiple sources, multiple access points, information sharing, different attributes, and graphic representations. The system can collect data from many sources that go into one central data point called the Mass Casualty Data Management Center. The information comes from institutions, public places, assisted living facilities, hospitals, EMS calls, and private residences. Once the data is collected the application of the GIS technology can be used to transmit, sort, archive, share, and secure the data. It can also be used to facilitate data entry through common forms as well as provide digital and satellite photography and geolocating or geocoding. The software can be applied in the planning of treatments, medication dispensing/immunizations, temporary morgues, body storage, cemeteries/crematories, and different caches. It can be used to optimize routing, in modifying existing protocols, and for regional expansion and integration. GIS can be used to support emergency and disaster operations, epidemiological studies, identification of remains, and family assistance centers. The methodology used in Prince William County, Va. Is an all-hazards approach, the use of existing systems, integrating all the sources into one common database, and identifying common elements of the process. The ARCGIS applications of the system are network analysis for routing applications and service areas, and geolocating. Routing applications can be used for immunizations as well as evacuation protocols. Service area applications can be used for fire and EMS first due response, funeral home service areas in mass casualty events, as well as modified service areas should the disaster render some response resources useless. Geolocating can pinpoint on a map incidents, patient locations, medical caches, quarantine sites, isolation areas, and monitoring locations.  D O e x  U f   ηΥηΥΛ}ΥhcL,h3cEh3cE5B*OJPJQJ_HaJph h3cE>*)hh3cEB*OJPJQJ_HaJphhqAhY0J_HjhYU_H hY_HjhYU_H#hYB*OJPJQJ_HaJph,h^9h3cE5B*OJPJQJ_HaJph#h3cEB*OJPJQJ_HaJph*h3cE5B*CJOJPJQJ_HaJphh3cECJOJQJ=K C D O e y  G q { | 5 ? @ U $a$gd3cEU g         & 9 : ; `gd$a$gd3cE % : ; ~  tuVŰףװmc^ZVZRVRVRVRVRhhHrhOX hOX>*h3cEhOX5>*#h B*OJPJQJ_HaJphh h 0J_Hjh h U_Hh h _Hjh h U_H)h h B*OJPJQJ_HaJph#h3cEB*OJPJQJ_HaJph)h h3cEB*OJPJQJ_HaJph&h3cE5B*OJPJQJ_HaJphtuReT)y$a$gd $`a$gd$a$gdhS`gdhS`gdSTVWX0 3 !""$$&9&@&R&^&))).00000ʻ hOXhh hQhBh]whU hBhfRhfRH*hfRhWhQh3cEhhS5h3cEhQ5>*hh&^hhS!WX ""$$^&_&'') ))) , ,--..0000`gdQgdQ,1h/ =!"#$% DyK sscarter@umuc.eduyK 2mailto:sscarter@umuc.eduDyK  Jdickman2@capellauniversity.eduyK Nmailto:Jdickman2@capellauniversity.edu^ 666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH DA`D Default Paragraph FontRiR  Table Normal4 l4a (k (No List NoN 3cEBody)B*CJOJPJQJ_HmH phsH tH 6U@6  Hyperlink >*B*phPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] (@ 0U 0(XX8@0(  B S  ?O~U~d!~!~~,~,~l~~~~,~l~~d~~~$~d~~$d$d 4 t   4t4t4t 4 t   4 t    4 !t " # $4 %t &ܽ'(\)*ܾ+,\-.ܿ/012\34$5d678$9d:=+UU^iqq"-55uzT&&.;;AN$$HHrr|A h \ G"G"L"U"Z"e""!#+%'(     " !#$%&'()+*,-./201345768:9;<>=?@ABCDIEFGHJKLMNJA]hppvv!,44::x}X-88@MTT11OO{D t _ K"T"Y"d"k"k""$#.%'(   !" #$%&'()+*,-./120345768:9;<>=?@ABCDFGHIEJKLMNB**urn:schemas-microsoft-com:office:smarttagscountry-region?N*urn:schemas-microsoft-com:office:smarttags stockticker8O*urn:schemas-microsoft-com:office:smarttagsdate9G*urn:schemas-microsoft-com:office:smarttagsState=K*urn:schemas-microsoft-com:office:smarttags PlaceName=J*urn:schemas-microsoft-com:office:smarttags PlaceType8H*urn:schemas-microsoft-com:office:smarttagsCity9L*urn:schemas-microsoft-com:office:smarttagsplace @b 1120012011689DayMonthYearONOLKJLHGLKJJLHLKJJLHNNNLKKKNLKJLKKJL*L*L*LKJL*NLKKKLGLHGLKJNLH*NLONNLKKKKJLNNL$-.4&-(g)xy @R(3333333eyUg(Uf( U ^93cEfRhSWOXY&^]wQHrBO((@ (@UnknownG* Times New Roman5Symbol3. * Arial;. * HelveticaC0000҉0 Pro W3A BCambria Math"1h;;"J"J!24((3QHX ?OX2!xxCPart 1: Teaching Infrastructure Security with a Public Policy Focus NC6400-XPPRObjohnso4Oh+'0 4 HT t  DPart 1: Teaching Infrastructure Security with a Public Policy FocusNC6400-XPPRO Normal.dotm bjohnso42Microsoft Office Word@G@<@<"՜.+,D՜.+,|8 hp  CITY OF CHICAGOJ( DPart 1: Teaching Infrastructure Security with a Public Policy Focus Title8 8@ _PID_HLINKSA R-'mailto:Jdickman2@capellauniversity.edu ;mailto:sscarter@umuc.edu   "#$%&'(*+,-./0123456789:;<=?@ABCDEGHIJKLMPRoot Entry F0<RData !1Table))WordDocument.@SummaryInformation(>DocumentSummaryInformation8FCompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q