Laserfiche WebLink
City of Santa Ana Emergency Operations Plan <br />Part I Basic Plan <br />equipment and have been trained to use it properly, the presence of a radiation hazard may not be discovered until <br />people begin experiencing symptoms of radiation poisoning. <br />Nuclear devices are explosive devices that derive their destructive force from a nuclear reaction. Nuclear devices <br />cause deadly effects when exploded, including blinding light, intense heat, blast damage, nuclear radiation, intense <br />fires, and widespread radioactive fallout that contaminates air, water and soil for miles. A nuclear device can <br />range from an intercontinental ballistic missile launched by a hostile nation or terrorist organization, to a small <br />portable device transported by an individual in a vehicle, suitcase or other large package. <br />A terrorist attack with a nuclear weapon would impact a much larger area than a conventional explosion, would <br />cause intense radiation sickness to those not killed in the explosion but exposed to contamination, and would <br />create long term health effects to humans, animals and food and water supplies. However, the ability to obtain <br />enriched nuclear materials, to design a successful nuclear explosion and to deliver the device to a target is much <br />more difficult and expensive to carry out than other terrorist tactics, making a nuclear attack much less likely. <br />Conventional Explosive devices are used to kill, seriously injure, or incapacitate people through physical injury <br />and to destroy structures. Conventional explosives are easily obtained and constructed and are by far the weapon <br />of choice for terrorists. The components are readily available, as are detailed instructions on constructing such a <br />device. They are easily hidden or deployed and can cause extensive damage. These devices may be constructed <br />from military grade bombs or weapons captured or abandoned in war zones, but can also be easily constructed as <br />improvised explosive devices (IED's). IED's can be assembled from readily available materials, including <br />commercially available fertilizer and petroleum products, blasting products used in construction or demolition <br />industries, or products available to any consumer like fireworks, gasoline, diesel fuel or propane tanks. Secondary <br />explosive devices may also be used as weapons against police and medical responders arriving in response to the <br />explosion of a primary device. <br />Alternative Weapons or Tactics — Terrorist tactics change as prevention and protection efforts improve against <br />previously used tactics. Alternative weapons and tactics are often low cost, using easily available items and can <br />be carried out almost spontaneously with little planning or preparation. (See Targeted Act of Violence Assessment <br />Section 2.4.9) These include: <br />• Active Shooters —Utilizing high -capacity firearms to shoot as many persons as possible in crowded venues <br />before intervention by law enforcement or other resistance. <br />• Vehicles as Weapons — Driving a car or truck into a crowded pedestrian plaza, shopping market or other public <br />gathering. <br />• Combined Coordinated Attacks — Multiple active shooters attacking multiple public gathering spots <br />simultaneously, which can also be combined with conventional explosive devices to increase injuries and <br />panic, to impede evacuation or escape, or to slow or impair the response of police or medical responders. <br />Cyber-Terrorism - Cyber-attacks and intrusions can be used by criminals, terrorists, insiders, and hostile foreign <br />nations to mask other attacks, shake citizens' confidence in the government, damage the economy or disrupt <br />delivery of essential services. As this threat continues to grow and evolve, concerns about the potentially severe <br />consequences of an effective cyber-attack against critical infrastructure facilities and systems increases. Cyber <br />threats result in the denial or disruption of essential services, including utilities, public health, finance, or law <br />enforcement networks. <br />A variety of attacks can by conducted by skilled cyber actors intent on harming municipal interests. Cyber threats <br />range from stealing organizational data, interrupting operational efforts, or sabotaging or destroying physical <br />technological infrastructure. In the past, cyber actors have targeted multiple Orange County entities. Common <br />tactics have included the use of ransom -ware, website defacements, distributed denial of service (DDoS) attacks, <br />or doxing (releasing hacked documents which reveal personal or confidential information about individuals, <br />businesses or government functions). <br />55 <br />