National Academies Press: OpenBook

Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide (2018)

Chapter: Appendix A: Vulnerability Self-Assessment Tool

« Previous: 5 Threat Assessment Response Protocol and Evaluation Methodology
Page 55
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 55
Page 56
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 56
Page 57
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 57
Page 58
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 58
Page 59
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 59
Page 60
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 60
Page 61
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 61
Page 62
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 62
Page 63
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 63
Page 64
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 64
Page 65
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 65
Page 66
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 66
Page 67
Suggested Citation:"Appendix A: Vulnerability Self-Assessment Tool." National Academies of Sciences, Engineering, and Medicine. 2018. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide. Washington, DC: The National Academies Press. doi: 10.17226/25114.
×
Page 67

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

56 Tools and Strategies for Eliminating Assaults Against Transit Operators: User Guide Personal Injury/Assault/Violent Acts Checklist (FTA Bus Safety) 1. ____ Date: Time received:__ 2. ____ Assign Incident Commander Name:______ Title:___ Post location: 3. ____ Type of Incident (threat, shooting, fight, etc.) 4. ____ Location 5. ____ Injuries (where and how many)? 6. ____ Suspect Description/Weapons/Location 7. ____ Fire (where and what)? 8. ____ Contact 911 and Transit Control Center (###-###-####) 9. ____ IC initiates incident command system in coordination with Law Enforcement Incident Commander. IC Name: Title: Post location: 10. ____ Determine if immediate evacuation or sheltering in place is needed for safety. DO NOT AUTOMATICALLY EVACUATE BUILDINGS. 11. ____ Ensure safety of victim if safe to do so 12. ____ Do not attempt to confront suspect. 13. ____ Preserve scene (close doors and windows). DO NOT TOUCH ANYTHING. 14. ____ Assemble witnesses when safe to do so for law enforcement. 15. ____ If evacuation is necessary due to fire or other life safety reasons, ALWAYS evacuate uphill, upwind, or up stream. 16. ____ Keep Transit Control Center (###-###-####) advised. 17. ____ Preserve all recordings and photos. 18. ____ Cooperate with Law Enforcement in the investigation. 19. ____ Brief manager and the supervisor, or their designee. 20. ____ Incident terminated by: Name: Title: Date:__ Time:________ Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

57 A1: Weighted Countermeasure Scores This table describes individual countermeasures weighted according to six factors: ease of use, industry use, time to implement, labor intensiveness, cost, and overall effectiveness. The total countermeasure score represents the overall strength of the countermeasure in terms of its performance in each area. The overall value of a countermeasure to an agency depends on two factors: the overall strength of the countermeasure, and the quality of the agency’s implementation of the countermeasure. The vulnerability self-assessment questionnaire in Appendix A2 allows a reviewer to assess how effectively each of these countermeasures has been implemented in a transit environment. A reviewer may compare the total countermeasure scores with agency- specific self-assessment scores obtained from Appendix A3 to evaluate the overall strengths and weaknesses of the agency’s assault countermeasures program. A P P E N D I X A Vulnerability Self-Assessment Tool Category Countermeasure Ease of Use Industry Use Time to Implement Labor Intensive Cost Effectiveness Total Countermeasure Score Scale .1–.3 .1–.3 .1–.3 .1–.3 .1–.3 .1–.5 .3 = easiest to use .3 = highest degree of industry use .3 = shortest time to implement .3 = least labor intensive .3 = lowest cost .5 = highest effectiveness Policy, Plans, and Protocols Fare Collection Policies 0.3 0.3 0.3 0.3 0.3 0.5 2 Communication Protocol for Violent Incidents 0.3 0.2 0.3 0.3 0.3 0.5 1.9 Operator Assaults Zero Tolerance Workplace Violence Policy Coverage 0.3 0.3 0.3 0.3 0.3 0.4 1.9 Operator Assault Committees/Task Forces 0.3 0.1 0.3 0.3 0.3 0.5 1.8 Post-Incident Action Steps 0.3 0.2 0.3 0.3 0.3 0.4 1.8 Passenger Code of Conduct 0.3 0.1 0.3 0.3 0.3 0.4 1.7 Violent Incident Emergency Response Plan 0.3 0.1 0.3 0.3 0.3 0.4 1.7 Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

58 Tools and Strategies for Eliminating Assaults Against Transit Operators: User Guide Category Countermeasure Ease of Use Industry Use Time to Implement Labor Intensive Cost Effectiveness Total Countermeasure Score Scale .1–.3 .1–.3 .1–.3 .1–.3 .1–.3 .1–.5 .3 = easiest to use .3 = highest degree of industry use .3 = shortest time to implement .3 = least labor intensive .3 = lowest cost .5 = highest effectiveness Assault Legislation 0.2 0.1 0.1 0.3 0.3 0.3 1.3 Passenger 0.2 0.1 0.2 0.2 0.2 0.3 1.2 Awareness Programs Barring Systems 0.1 0.1 0.2 0.2 0.2 0.3 1.1 Passenger Screening 0.1 0.1 0.1 0.1 0.1 0.5 1 Police or Security Staffing Staffing On Board Conveyance 0.3 0.1 0.3 0.1 0.1 0.5 1.4 Shadowing Vehicles 0.1 0.1 0.3 0.2 0.1 0.3 1.1 Centralized On-Board Alarms, Panic Buttons with Immediate Force Response 0.2 0.1 0.2 0.1 0.1 0.3 1 Centralized Surveillance with Immediate Force Response 0.1 0.1 0.2 0.1 0.1 0.4 1 Centralized Remote Sensors with Immediate Force Response 0.1 0.1 0.1 0.3 0.1 0.3 1 Voice Communica- tions Technology Two-Way Radio 0.3 0.3 0.3 0.3 0.2 0.4 1.8 Cellular Telephone— Texting and Emailing 0.3 0.1 0.3 0.3 0.3 0.2 1.5 Two-Way Radio using 3G/4G/LTE/ Satellite Mobile Broadband Least- Cost Routing 0.2 0.2 0.2 0.2 0.2 0.4 1.4 Real-Time Audio 0.2 0.1 0.1 0.3 0.3 0.2 1.2 Data Communica- tions and Tracking and Monitoring Global Positioning System 0.3 0.2 0.2 0.3 0.2 0.4 1.6 Telemetry Systems (GPS) Vehicle Disabling 0.3 0.2 0.2 0.3 0.2 0.4 1.6 Anti-Theft—Secure Driver Sign On 0.3 0.2 0.2 0.3 0.2 0.4 1.6 Anti-Theft—Enroute 0.3 0.2 0.2 0.3 0.2 0.4 1.6 Mobile Data Terminals (MDT) with DVRs 0.2 0.2 0.2 0.3 0.1 0.4 1.4 Electronic Distress Signs 0.3 0.1 0.2 0.3 0.2 0.3 1.4 Vehicle Locator Systems (AVLs)— Global Positioning System (GPS) 0.2 0.1 0.1 0.3 0.2 0.4 1.3 Intelligence Information Sharing Cooperation 0.2 0.2 0.3 0.3 0.3 0.3 1.6 Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

Vulnerability Self-Assessment Tool 59 Category Countermeasure Ease of Use Industry Use Time to Implement Labor Intensive Cost Effectiveness Total Countermeasure Score Scale .1–.3 .1–.3 .1–.3 .1–.3 .1–.3 .1–.5 .3 = easiest to use .3 = highest degree of industry use .3 = shortest time to implement .3 = least labor intensive .3 = lowest cost .5 = highest effectiveness Surveillance and Observation Systems Visible Surveillance Systems—Cameras in Plain Sight 0.2 0.2 0.1 0.3 0.2 0.4 1.4 Bus Stop Lighting 0.2 0.1 0.1 0.3 0.2 0.3 1.2 Video Surveillance Using On-board Computer/DVR 0.2 0.2 0.2 0.2 0.2 0.2 1.2 Physical Barriers/ Compartment Barriers or Shielding—Full or Partial 0.3 0.1 0.1 0.3 0.2 0.5 1.5 Driver Protection Systems Public Address System and Signage 0.3 0.3 0.2 0.2 0.2 0.3 1.5 Defensive Weapons 0.2 0.2 0.2 0.3 0.2 0.3 1.4 DNA Swipe Kits 0.2 0.1 0.3 0.3 0.3 0.2 1.4 Driver-Side Exit Doors 0.2 0.1 0.3 0.2 0.1 0.4 1.3 Training Driver/Operator Handbook 0.3 0.3 0.3 0.3 0.3 0.5 2 Driver/Operator Security Awareness 0.3 0.3 0.3 0.3 0.3 0.5 2 Driver/Operator Security 0.2 0.2 0.2 0.2 0.2 0.5 1.5 Driver/Operator Security Communication 0.2 0.2 0.2 0.2 0.2 0.4 1.4 Drills, Exercises, and Immediate Actions 0.1 0.1 0.2 0.2 0.2 0.4 1.2 Driver/Operator Self-Defense 0.2 0.1 0.2 0.2 0.2 0.3 1.2 A2: Vulnerability Self-Assessment Questionnaire The vulnerability self-assessment questionnaire allows a reviewer to assess the strength of an agency’s operator assault approach and the agency’s unique vulnerabilities based on specific details of each countermeasure currently in use. Each countermeasure is followed by one or more questions worth between 0.5 and 5 points; the maximum number of points available for each countermeasure is 5 points. Upon completing this questionnaire, an agency will possess straightforward, easy-to-interpret scores that demonstrate vulnerabilities and opportunities for growth. Later portions of the agency assessment will allow your agency to use these scores, along with information about specific countermeasures, to eliminate vulnerabilities in a systematic and organized manner. STEP 1: For each question below, enter the allotted number of points in the “score” column if the answer to a question is “yes.” If the answer is “no,” award 0 points. Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

60 Tools and Strategies for Eliminating Assaults Against Transit Operators: User Guide STEP 2: Once you have answered each of the questions, add the point values recorded in the “score” column to produce a total score for each countermeasure. Total scores for each counter- measure will range from 0 to 5. STEP 3: After generating a total score for each countermeasure in the vulnerability self-assess- ment questionnaire, transfer each total countermeasure score to the self-assessment final scores matrix. This step, which is described in detail later on in the report, will empower your agency to act on the results of the vulnerably self-assessment questionnaire by evaluating the overall performance, strengths, and potential areas for improvement in incorporating operator assault countermeasures. VULNERABILITY SELF-ASSESSMENT QUESTIONNAIRE Category 1: Policies, Plans, and Protocols Countermeasures Questions Points Available Score Fare Collection Policies Does your agency have a fare collection policy to reduce potential for conflict over payment? 3 Do employees receive training and routine refresher information regarding their responsibilities within the policy? 1 Is the policy strictly enforced (except when enforcing the policy would expose the employee to significant risk)? 1 Total Communication Protocol for Violent Incidents (Incident Command System) Does your agency have a communication protocol for violent incidents? 3 Does the protocol incorporate outside emergency responders and like agencies? 0.5 Are employees trained to their responsibilities within the protocol? 0.5 Has the protocol been tested in an exercise/drill or a live incident within the past 3 years? 0.5 Has an after-action report/improvement plan been developed and implemented based on the results of the exercise/drill or incident? 0.5 Total Operator Assaults Zero Tolerance Workplace Violence Policy Coverage Does your agency have a zero tolerance workplace violence policy? 3 Are employees required to sign off on receipt of the policy? 1 Is the policy endorsed by upper management? 0.5 Is the policy enforced? 0.5 Total Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

Vulnerability Self-Assessment Tool 61 Countermeasures Questions Points Available Score Operator Assault Committees/Task Forces Does your agency have an operator assault committee or task force, or are incidents addressed by another committee or task force? 3 Are all levels of the agency (operators, supervisors, management, unions, HR, etc.) involved? 1 Are the recommendations developed by the committee or task force put into practice? 1 Total Post-Incident Action Steps Has your agency developed post-incident action steps (counseling, legal, financial, etc.)? 4 Is a process in place to review and update the post-incident action steps at least once every 3 years? 1 Total Passenger Code of Conduct Does your agency have a passenger code of conduct? 3 Is the code of conduct posted on every vehicle in the fleet? 1 Is the passenger code of conduct strictly enforced through issuance of notice of violation? 1 Total Violent Incident Emergency Response Plan Does your agency have a violent incident emergency response plan? 3 Does the plan identify specific personnel roles and their lines of authority at each level within the agency? 0.5 Does the plan provide emergency response procedures? 0.5 Does the plan provide lines of communication to proper personnel? 0.5 Has the plan been updated within the past 3 years? 0.5 Total Intelligence Information Sharing Cooperation Is there a process in place to gather and share information? 2 Is there a process to relay information to agency personnel? 1 Is intelligence gathered by the agency used to identify, mitigate, and prevent incidents? 1 Is there a designated point of contact in the agency for intelligence sharing? 1 Total Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

62 Tools and Strategies for Eliminating Assaults Against Transit Operators: User Guide Countermeasures Questions Points Available Score Assault Legislation Does assault legislation in the area where your agency operates include enhanced penalties for operator assaults? 3 Are laws against operator assault routinely enforced in your area? 2 Total Passenger Awareness Programs Does the agency have a passenger awareness program? 3 Does the program identify how the public may report concerns and who to report them to? 1 Does the agency track and analyze reported incidents from the passenger awareness program? 1 Total Barring Systems Is there a barring system in place within the agency? 3 Do the barring systems include technologies to identify potential or past aggressors? 1 Does this system allow the operator the liberty to deny the aggressor entrance into the vehicle? 1 Total Passenger Screening Is there a passenger screening system in place? 4 Is there training in place to support the passenger screening program? 1 Total Category 2: Police or Security Staffing Countermeasure Questions Points Available Score Staffing On Board Conveyance Does your agency provide police/security/supervisors randomly, by directed patrol, or on all your vehicles? 5 Total Shadowing Vehicles Do police, security, or supervisors “shadow” your vehicles on a routine basis? 5 Total Centralized On-Board Alarms, Panic Buttons with Immediate Force Response Does your agency use on-board alarms/panic buttons? 4 Is there an identified immediate response by a dedicated police/security/supervisor element to the use of these types of alarms? 1 Total Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

Vulnerability Self-Assessment Tool 63 Countermeasure Questions Points Available Score Centralized Surveillance with Immediate Force Response Does your agency use centralized surveillance on their vehicles? 3 Is there an identified immediate response by a dedicated police/security/supervisor element to what is observed? 1 Is there an identified immediate response by a dedicated police/security/supervisor element to what is observed? 1 Total Centralized Remote Sensors with Immediate Force Response Does your agency use these devices (pagers/sensors) to detect dangerous substances, such as radioactive or biohazardous material, and alert the operator or dispatch when the vehicle has been contaminated? 4 If deployed does your agency provide immediate response by a dedicated police/security/supervisor element specialized for this type of incident? 1 Total Category 3: Voice Communications Technology Countermeasure Questions Points Available Score Two-Way Radio Are all your vehicles equipped with two-way radios? 3 Is each operator assigned a two-way radio? 0.5 Does the issued two-way radio have a “panic button”? 0.5 Does the agency routinely check radios for reliability? 0.5 Is there an emergency radio communications procedure in place? 0.5 Total Cellular Telephone— Texting and Emailing Does your agency allow the use of cell phones as a communication device? 3 Is there a clear policy/procedure/SOP defining the use of cell phones for communication purposes? 1 Has that policy/procedure/SOP been updated within the past 3 years? 1 Total Two-Way Radio using 3G/4G/LTE/ Satellite Mobile Broadband Least-Cost Routing Does your agency use this updated technology? 3 Is there a policy/procedure/SOP concerning the use of this technology? 1 Has that policy/procedure/SOP been updated within the past 3 years? 1 Total Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

64 Tools and Strategies for Eliminating Assaults Against Transit Operators: User Guide Countermeasure Questions Points Available Score Real-Time Audio Does your agency use Real-Time Audio recording? 3 Can your control center or any other management function listen to live audio from the vehicle? 1 Is the information gathered using this technology shared internally and/or with outside responders? 1 Total Category 4: Data Communications and Telemetry Systems Countermeasure Questions Points Available Score Tracking and Monitoring Global Positioning System (GPS) Does your agency use GPS technology to track and monitor vehicles? 3 Is there a policy/procedure/SOP concerning the use of this technology? 1 Has that policy/procedure/SOP been updated within the past 3 years? 0.5 Is the information gathered using this technology shared internally and/or with outside responders? 0.5 Total Vehicle Disabling Does your agency use a vehicle disabling system? 3 Does the agency maintain a formal plan/policy/procedure regarding the use of this system? 1 Has the plan/policy/procedure been updated within the past 3 years? 1 Total Anti-Theft—Secure Driver Sign On Are your vehicles equipped with a secure startup system? 3 Does the agency maintain a formal plan/policy/procedure regarding the use of this system? 1 Has the plan/policy/procedure been updated within the past 3 years? 1 Total Anti-Theft—Enroute Are your vehicles equipped with an enroute anti-theft system? 3 Does the agency maintain a formal plan/policy/procedure regarding the use of this system? 1 Has the plan/policy/procedure been updated within the past 3 years? 1 Total Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

Vulnerability Self-Assessment Tool 65 Countermeasure Questions Points Available Score Mobile Data Terminals (MDT) with DVRs Are your agency’s vehicles equipped with mobile data terminals? 2 Do the terminals support storage of data forms including live video, live audio, and alarms? 1 Is there a policy/procedure/SOP concerning the use of mobile data terminals? 1 Has that policy/procedure/SOP been updated within the past 3 years? 1 Total Electronic Distress Signs Does your agency use electronic distress sign technology? 4 Are electronic distress signs tested for reliability? 1 Total Vehicle Locator Systems (AVLs)— Global Positioning System (GPS) Does your agency use a vehicle locator system? 4 Is the information gathered using this technology shared internally and/or with outside responders? 1 Total Category 5: Surveillance and Observation Systems Countermeasure Questions Points Available Score Visible Surveillance Systems—Cameras in Plain Sight Does your agency deploy a visible video surveillance system? 3 Can video from this system be viewed in real time? 1 Does your agency maintain a formal plan or policy for review of data captured via this system and sharing of that data with other agencies? 1 Total Bus Stop Lighting Does your agency deploy bus stop lighting for security purposes? 3 Does your agency maintain a formal policy or plan regarding lighting at new and existing bus stops? 1 Is the agency capable of reconfiguring bus stop lighting in response to operator or patron input? 0.5 Does the agency regularly inspect bus stop lighting to ensure that it is working? 0.5 Total Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

66 Tools and Strategies for Eliminating Assaults Against Transit Operators: User Guide Countermeasure Questions Points Available Score Video Surveillance Using On-Board Computer/DVR Does your agency conduct video surveillance using on-board computer or DVR? 3 Is there a policy/procedure/SOP concerning the use of video surveillance systems? 1 Has that policy/procedure/SOP been updated within the past 3 years? 1 Total Category 6: Driver Protection Systems Countermeasure Questions Points Available Score Physical Barriers/Compartment Barriers or Shielding— Full or Partial Does your agency use full (5 points) or partial (3 points) physical barriers or shielding? 5 or 3 Total Public Address System and Signage Does your agency use a public address system on your vehicles? 3 Does your agency use a public address system at your stations/stops? 0.5 Does your agency deploy signage on your vehicles that relates to safety and security? 0.5 Does your agency deploy signage at your stations/stops that relates to safety and security? 0.5 Does the signage advise how to report information & who to report the information for mitigation? 0.5 Total Defensive Weapons Does your agency allow operators to use defensive weapons? 3 Are policies/procedures in place regarding the use of defensive weapons? 1 Have those polices/procedures been updated within the past 3 years? 1 Total DNA Swipe Kits Does your agency partner with police/security to deploy DNA swipe kits during investigation/prosecution of incidents/assaults? 5 Total Driver-Side Exit Doors Do your agency’s vehicles have driver-side exit doors? 5 Total Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

Vulnerability Self-Assessment Tool 67 Category 7: Training Countermeasure Questions Points Available Score Driver/Operator Handbook Does your agency have a driver operator handbook? 2 Does the handbook incorporate information on operator assault? 1 Has the handbook been updated within the past 3 years? 1 Does your agency enforce rules compliance regarding the handbook? 1 Total Driver/Operator Security Awareness Does your agency have operator security awareness policies/procedures? 3 Do the employees receive formal training regarding their responsibilities? 0.5 Have operator security awareness policies/procedures been updated within the past 3 years? 0.5 Do the employees receive refresher training regarding operator security awareness? 0.5 Does the awareness policy/procedure cover how to report suspicious activity or witnessed events and who to report them to for mitigation? 0.5 Total Driver/Operator Do operators receive training for self-defense? 3 Security Do operators receive training for conflict resolution (verbal judo, de-escalation processes, voice control, etc.) with hostile passengers, intoxicated (drug or alcohol) passengers and/or mentally challenged and/or impaired passengers? 2 Total Driver/Operator Security Communication Does your agency provide training for driver operator security communication policies/procedures? 2 Does your agency have a policy/procedure for redundant communication should the primary communication system become inoperable? 2 Has the training for operator security communication policies/procedures been updated within the past 3 years? 0.5 Does your agency train on use of the “panic alarm”/“emergency call button” available to operators? 0.5 Total Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

68 Tools and Strategies for Eliminating Assaults Against Transit Operators: User Guide A3: Self-Assessment Final Scores Matrix Populate this table with the individual countermeasure scores developed using the vulner- ability self-assessment questionnaire. Next, multiply each vulnerability self-assessment score by the countermeasure ranking to produce your countermeasure score. For example, a vulner- ability self-assessment score of 4 multiplied by a countermeasure ranking of 1.8 yields an overall countermeasure score of 7.2. Complete this step for all countermeasures. Countermeasure Questions Points Available Score Drills, Exercises, and Immediate Actions Does your agency conduct drills/exercises involving response to violent incidents on vehicles? 3 Do those drills/exercises involve outside emergency responders? 0.5 Does your agency conduct “hotwashes” and prepare “after-action reports” regarding drills or exercises, and develop improvement plans based on the findings? 0.5 Are the improvement plans tracked for completion? 0.5 Does your agency conduct after-action reviews of real-world incidents? 0.5 Total Does your agency train operators to defend themselves from aggressive attacks? 4 Driver/Operator Self-Defense Has the training for operator self-defense been updated within the past 3 years? 0.5 Do operators receive regular refresher training on self-defense? 0.5 Total Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Copyright National Academy of Sciences. All rights reserved.

Next: Appendix B: Route-Based Risk Calculator Template »
Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide Get This Book
×
 Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB's Transit Cooperative Research Program (TCRP) Research Report 193: Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 2: User Guide provides potential countermeasures and strategies to prevent or mitigate assaults against transit operators. The User Guide includes an operator assault risk management toolbox developed to support transit agencies in their efforts to prevent, mitigate, and respond to assaults against operators. The User Guide also provides transit agencies with guidance in the use and deployment of the vulnerability self-assessment tool and the route-based risk calculator and includes supportive checklists, guidelines, and methodologies.

Transit industry policies, practices, and operating procedures related to preventing, mitigating, and responding to operator assaults are not uniform. The policies and procedures set by the transit agency and situational and design factors can shape mitigation approaches. The format, scale, and implementation of these measures vary greatly among transit agencies. Many agencies have written policies that address workplace violence prevention, but they vary widely in content, scope, and application. Relevant skills and training required by transit operators to address this issue vary as well.

TCRP Research Report 193: Tools and Strategies for Eliminating Assaults Against Transit Operators, Volume 1: Research Overview documents the materials and methodology used to develop Volume 2: User Guide.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!