Washington State Critical Infrastructure Program Infrastructure Protection Office

  • Slides: 15
Download presentation
Washington State Critical Infrastructure Program Infrastructure Protection Office Emergency Management Division Washington Military Department

Washington State Critical Infrastructure Program Infrastructure Protection Office Emergency Management Division Washington Military Department “No security, No infrastructure” 1

Mission / Agenda Identify Locate Assess Protect Critical Infrastructure that if lost or disrupted

Mission / Agenda Identify Locate Assess Protect Critical Infrastructure that if lost or disrupted would have a devastating effect on the citizens of Washington 2

Authority • HSPD 7, Critical Infrastructure Identification, Prioritization, and Protection, December 17, 2003 •

Authority • HSPD 7, Critical Infrastructure Identification, Prioritization, and Protection, December 17, 2003 • National Infrastructure Protection Plan (NIPP), 2006 • Washington Statewide Homeland Security Strategic Plan, 2006 -2011 • Washington Infrastructure Protection Plan (WIPP), February 2008 3

Identify • Infrastructure Protection Sub-Committee • Infrastructure Protection Office • Washington Military Department •

Identify • Infrastructure Protection Sub-Committee • Infrastructure Protection Office • Washington Military Department • Department of Homeland Security • Other 4

Selection Criteria • Developed by: – Department of Homeland Security – Infrastructure Protection Sub.

Selection Criteria • Developed by: – Department of Homeland Security – Infrastructure Protection Sub. Committee, Infrastructure Sector Leads – Other Customers 5

Critical Infrastructure Sectors 1 - Agriculture & Food 10 - Health Care & Public

Critical Infrastructure Sectors 1 - Agriculture & Food 10 - Health Care & Public Health 2 - Banking & Finance 11 - Transportation 3 - Chemical and Hazmat 12 - Water & Wastewater 4 - Defense Industrial Base 13 - Monuments & Icons 5 - Energy 14 - Commercial Assets 6 - Emergency Services 15 - Government Facilities 7 - Information Technology 16 - Dams & Levees 8 - Telecommunications 17 - Nuclear Facilities 9 - Postal & Shipping 18 - Critical Manufacturing 6

Locate - Map (Validating and Vetting) • Infrastructure Protection Office, Emergency Management Division •

Locate - Map (Validating and Vetting) • Infrastructure Protection Office, Emergency Management Division • Washington National Guard, Washington Military Department 7

Assessment Resources • WNG – 262 nd Information Warfare Aggressor Squadron (IWAS) – 56

Assessment Resources • WNG – 262 nd Information Warfare Aggressor Squadron (IWAS) – 56 th Theater Information Operations Group (TIOG) – Critical Infrastructure Protection Vulnerability Assessment Team (CIP Tm) – Full Spectrum Integrated Vulnerability Assessment (Former FSIVA Members) • Washington Association of Sheriffs and Police Chiefs (WASPC) 8

Assessment Types • IPO, EMD – Buffer Zone – CARVER – MSHARRPP + V

Assessment Types • IPO, EMD – Buffer Zone – CARVER – MSHARRPP + V • WNG - Other • DHS – Comprehensive Reviews – Top Screen – Site Assistance Visit 9

Assessment Support • Washington Joint Analytical Center (WAJAC) – Provides Threat • Argonne National

Assessment Support • Washington Joint Analytical Center (WAJAC) – Provides Threat • Argonne National Laboratory – Provides Background / History • Argonne National Laboratory – Provides Interdependencies Profile • Equipment Sub-Committee – Approves Equipment Selection 10

Protect Private Security Force (SOPS and Policies inside the fence) Local Law Enforcement (Buffer

Protect Private Security Force (SOPS and Policies inside the fence) Local Law Enforcement (Buffer Zone Plan outside the fence) and Local Tactical Plan) State Law Enforcement (Support Local Tactical Plan) Washington National Guard (Support Local Tactical Plan) 11

Document Protection • Protected Critical Infrastructure Information (PCII), DHS – Accessed only by authorized

Document Protection • Protected Critical Infrastructure Information (PCII), DHS – Accessed only by authorized and trained individuals – Used for analysis of threats, vulnerabilities and other homeland security purposes – Protected from disclosure under FOIA and similar State and local disclosure laws – Not used directly in civil litigation nor the basis for regulatory action • WA IPO Accredited September 21, 2007 12

Plan Protection-Federal • Automated Critical Asset Management System – ACAMS, DHS – Secure –

Plan Protection-Federal • Automated Critical Asset Management System – ACAMS, DHS – Secure – Controlled Access – Online data entry and retrieval – Inventory – Asset Management – Owner • Covered by PCII 13

Plan Protection-State RCW 42. 56. 420 (1) Those portions of records assembled, prepared, or

Plan Protection-State RCW 42. 56. 420 (1) Those portions of records assembled, prepared, or maintained to prevent, mitigate, or respond to criminal terrorist acts, which are acts that significantly disrupt the conduct of government or of the general civilian population of the state or the United States and that manifest an extreme indifference to human life, the public disclosure of which would have a substantial likelihood of threatening public safety, consisting of: (a) Specific and unique vulnerability assessments or specific and unique response or deployment plans, including compiled underlying data collected in preparation of or essential to the assessments, or to the response or deployment plans; and (b) Records not subject to public disclosure under federal law that are shared by federal or international agencies, and information prepared from national security briefings provided to state or local government officials related to domestic 14 preparedness for acts of terrorism;

Thank you Jeff Parsons 253 -512 -7065 J. parsons@emd. wa. gov 15

Thank you Jeff Parsons 253 -512 -7065 J. parsons@emd. wa. gov 15