- Hits: 1746
02 / 27 / 2015
ATMS ... What is it?
After the terrorist attack to the World Trade Center (WTC), the terrorist threat has increased significantly, always in a different way and with a new and sophisticated tactics. The critical infrastructures owners are faced with a new problem, because their structures are being targeted by various terrorist groups. Damages to critical infrastructure can have a domino effect on national security, therefore the security of such facilities must be designed in the best way.
Antiterrorism Consulting helps, through ATMS - AntiTerrorism Management System, managers and / or owners of critical infrastructures to reduce the risks related to the terrorist threats, that can cause damage to the structure, or occupants or compromise its critical functions, and thus inflict economic losses.
AntiTerrorism Management System is built on six steps, which allow you to analyze and study the terrorist threat as a whole, without leaving any factor to chance or luck.
1. The first step is to conduct a threat assessment to identify, define and quantify the threats. After we have identified the primary threats, based on the available information, the next step is to estimate a classification of their dangerousness. The score is a measure of the possibility or probability that a specific type of terrorist attack will be carried out against the structure.
2. The second stage is the assessment of potential consequences of an attack, and the consequent loss of life or structure's functions. The study will focus on the use, occupation, and the importance of the property by the owner or from the point of view of the evaluator.
3. The third phase identifies potential vulnerabilities of critical assets against the threats identified before. Vulnerability refers to the likelihood that damages, losses and interruptions can occur as a result of a specific attack in specific circumstances. The vulnerabilities are the characteristics of an asset that make it susceptible to destruction or incapacitation by a terrorist group. A vulnerability assessment is a detailed analysis of the functions of the structure, systems and features of the site to identify the weaknesses of the structure, that can be exploited during a terrorist attack. These assessments are critical to determine not only the magnitude of the consequences, but also to determine protection measures or corrective actions that may be designed or implemented to reduce them.
The purpose of these first three steps, is to provide information to the owner of the structure on the current exposure of his structure to terrorist threat. In this way he can decide which security options are the most feasible and convenient.
4. Once the risks have been quantified and ordered, according to the strategic importance and operational structure, based on the economic value and operational value, we begin to identify and prioritize the protection measures that reduce these risks. When the process of risk assessment has been completed, the stakeholders are often left with the knowledge that a number of activities, may require protective measures, exceed the available resources. Therefore, decisions need to be made to prioritize the available resources on the most important activities and on the more effective mitigation measures. This process allows the managers to identify and choose the areas to be protected according to their budget, and then they accept the remaining risk for the remaining areas. This then allows the operator to choose the least "acceptable risk" for its structure.
The concept of "acceptable risk" is based on the recognition that the total elimination of the risk of a terrorist attack is an unattainable goal. Some damage from a terrorist attack should be anticipated, and the goal is to determine how much and what kind of damage could be acceptable.
5. After we have identifying the areas most at risk, we proceed with development of a Security Plan, that is able to reduce the vulnerability of structure to the terrorist threat. The Security plan will developed to analyze the costs and benefits of each possible solution, in order to optimize the expenditure. During this process, it may be convenient, sometimes, to make architectural changes to reduce future spending; to better understand this concept you can think of setup a natural barrier impassable to a car, rather than considering to setup a perimeter specifically designed against this type of threat.
6. The final part consist in creation and implementation of standards and procedures. The AntiTerrorism Management System - ATMS, that we will make, it will aim to help the structure to anticipate, absorb and adapt itself to an terrorist attack, and quickly recover the activity after an event. In this way the structure is able to reduce the cost of repairing damage and the cost of downtime. Standards and procedures will be created on the needs of the structure, and in cooperation with staff of the structure, so, these procedures will not interfere or impede the normal work process. In this way, the standards will be made much more efficient and integrated in the business. The realization of standards outside the working reality, can be an obstacle to the normal activities, and therefore they will not be accepted by all parties. If this situation will happen, will be born a new vulnerability not evaluated.
by - Antiterrorism Consulting ®