City of Santa Ana Emergency Operations Plan
<br />Part I Basic Plan
<br />equipment and have been trained to use it properly, the presence of a radiation hazard may not be discovered until
<br />people begin experiencing symptoms of radiation poisoning.
<br />Nuclear devices are explosive devices that derive their destructive force from a nuclear reaction. Nuclear devices
<br />cause deadly effects when exploded, including blinding light, intense heat, blast damage, nuclear radiation, intense
<br />fires, and widespread radioactive fallout that contaminates air, water and soil for miles. A nuclear device can
<br />range from an intercontinental ballistic missile launched by a hostile nation or terrorist organization, to a small
<br />portable device transported by an individual in a vehicle, suitcase or other large package.
<br />A terrorist attack with a nuclear weapon would impact a much larger area than a conventional explosion, would
<br />cause intense radiation sickness to those not killed in the explosion but exposed to contamination, and would
<br />create long term health effects to humans, animals and food and water supplies. However, the ability to obtain
<br />enriched nuclear materials, to design a successful nuclear explosion and to deliver the device to a target is much
<br />more difficult and expensive to carry out than other terrorist tactics, making a nuclear attack much less likely.
<br />Conventional Explosive devices are used to kill, seriously injure, or incapacitate people through physical injury
<br />and to destroy structures. Conventional explosives are easily obtained and constructed and are by far the weapon
<br />of choice for terrorists. The components are readily available, as are detailed instructions on constructing such a
<br />device. They are easily hidden or deployed and can cause extensive damage. These devices may be constructed
<br />from military grade bombs or weapons captured or abandoned in war zones, but can also be easily constructed as
<br />improvised explosive devices (IED's). IED's can be assembled from readily available materials, including
<br />commercially available fertilizer and petroleum products, blasting products used in construction or demolition
<br />industries, or products available to any consumer like fireworks, gasoline, diesel fuel or propane tanks. Secondary
<br />explosive devices may also be used as weapons against police and medical responders arriving in response to the
<br />explosion of a primary device.
<br />Alternative Weapons or Tactics — Terrorist tactics change as prevention and protection efforts improve against
<br />previously used tactics. Alternative weapons and tactics are often low cost, using easily available items and can
<br />be carried out almost spontaneously with little planning or preparation. (See Targeted Act of Violence Assessment
<br />Section 2.4.9) These include:
<br />• Active Shooters —Utilizing high -capacity firearms to shoot as many persons as possible in crowded venues
<br />before intervention by law enforcement or other resistance.
<br />• Vehicles as Weapons — Driving a car or truck into a crowded pedestrian plaza, shopping market or other public
<br />gathering.
<br />• Combined Coordinated Attacks — Multiple active shooters attacking multiple public gathering spots
<br />simultaneously, which can also be combined with conventional explosive devices to increase injuries and
<br />panic, to impede evacuation or escape, or to slow or impair the response of police or medical responders.
<br />Cyber-Terrorism - Cyber-attacks and intrusions can be used by criminals, terrorists, insiders, and hostile foreign
<br />nations to mask other attacks, shake citizens' confidence in the government, damage the economy or disrupt
<br />delivery of essential services. As this threat continues to grow and evolve, concerns about the potentially severe
<br />consequences of an effective cyber-attack against critical infrastructure facilities and systems increases. Cyber
<br />threats result in the denial or disruption of essential services, including utilities, public health, finance, or law
<br />enforcement networks.
<br />A variety of attacks can by conducted by skilled cyber actors intent on harming municipal interests. Cyber threats
<br />range from stealing organizational data, interrupting operational efforts, or sabotaging or destroying physical
<br />technological infrastructure. In the past, cyber actors have targeted multiple Orange County entities. Common
<br />tactics have included the use of ransom -ware, website defacements, distributed denial of service (DDoS) attacks,
<br />or doxing (releasing hacked documents which reveal personal or confidential information about individuals,
<br />businesses or government functions).
<br />55
<br />
|