United States Fire Administration Critical Infrastructure Protection - February 19, 2004
CIP Process Synopsis
The Emergency Management and Response--Information Sharing and Analysis Center (EMR-ISAC) research indicates that hundreds of communities and their fire and emergency medical services still lack sufficient resources to effectively protect their indispensable personnel, physical assets, and communication systems. Additionally, there is ample evidence that local emergency managers and fire/EMS chief officers persevere in the struggle to do more with less. For these reasons the EMR-ISAC continues to recommend the implementation of the Critical Infrastructure Protection (CIP) Process.
The CIP Process was developed to ensure scarce resources (e.g., money, time, people, and materials) are applied exclusively to those infrastructures and key assets that really need protection. Utilization of the process should reduce to the absolute minimum the infrastructures and key assets that genuinely require protective measures. A synopsis of this time-efficient and resource-restrained process follows for those who are new to this valuable and user-friendly methodology:
- Identify critical infrastructures and key assets that are credibly threatened by all hazards.
- Determine the vulnerabilities of those critical infrastructures and key assets that are credibly threatened.
- Assess the risks of degradation or loss of those critical infrastructures and key assets that are credibly threatened and vulnerable.
- Apply protective measures for those critical infrastructures and key assets where risk is unacceptable.
For technical assistance with the process, see the CIP Process Job Aid at: http://www.usfa.fema.gov/fire-service/cipc/cipc-jobaid.shtm. For consultation, contact the EMR-ISAC at 301-447-1325, or at [email protected].
Situational Awareness: A CIP Necessity
Law enforcement authorities throughout the United States receive intermittent reports regarding suspicious activities. Occasionally, the incidents may pertain to an individual or individuals who have attempted to impersonate emergency first responders. Although few in number, these attempts should elicit caution and situational awareness by first response departments, because impersonation is a tactic that has been used by al Qaeda operatives around the world. Furthermore, counterterrorism specialists teach that impostors from extremist groups endeavor to penetrate organizations to conduct deception activities, which conceal a planned terrorist attack.
To reduce or eliminate the risk of subterfuge by an adversary, many emergency departments have begun issuing identification (ID) cards to employees. Some of these organizations have initiated ID card programs in a low cost manner by using existing mechanisms such as those at the local schools and colleges. Others have pursued a cost-effective regional approach by purchasing an ID card machine for use by all the departments within a given region or county. Security experts write that any ID card program should be comprehensively and efficiently executed to include all department personnel regardless of where the ID cards are made.
The ruses and ploys of domestic and transnational terrorists cannot be degraded or defeated by a quality ID card program alone. All the leaders and personnel of an organization must supplement any protective measures with outstanding situational awareness. Perpetual vigilance for suspicious persons and activities in all situations and circumstances will significantly enhance the protection of a department