Running head: RISK ASSESSMENT WILLIAM AND MARY 1
Risk Assessment of the College of William and Mary:
Parts I-III
Elizabeth C. Russ
Virginia Commonwealth University
Example for students
*Note that the order of this example is a little different than what your instructions say. Use this
as a guide but go strictly by the instructions.
RISK ASSESSMENT WILLIAM AND MARY 2
Table of Contents
Critical Infrastructure………………………………………………………………………………5
Best Practices for Critical Infrastructure Identification……………………………………………5
National Preparedness and Homeland Security Directives……………………………………….7
Executive Order 13010…………………………………………………………………….7
Executive Order 13231…………………………………………………………………….8
National Infrastructure Protection Plan and Presidential Policy Directive 21…………….8
Homeland Security Presidential Directive 7……………………………………………….9
The College of William and Mary Profile…………………………………………………………9
An All-Hazards Approach……………………………………………………………………….10
William and Mary’s Critical Infrastructure………………………………………………………11
Sadler Center……………………………………………………………………………….11
Swem Library………………………………………………………………………………11
Wren Building………………………………………………………………………………12
Power Plant…………………………………………………………………………………12
Commons Dining Hall………………………………………………………..………….12
Law School…………………………………………………………………………………12
Zable Stadium……………………………………………………………………………..13
William and Mary Hall……………………………………………………………………13
Recreation Center…………………………………………………………………………13
Campus Center…………………………………………………………………………….13
Integrated Science Center………………………………………………………………..13
Phi Beta Kappa/ Andrews Hall……………………………………………………………14
RISK ASSESSMENT WILLIAM AND MARY 3
Small Hall…………………………………………………………………………………..14
School of Education……………………………………………………………………….14
Matoaka Amphitheater…………………………………………………………………….14
Sunken Gardens…………………………………………………………………………..15
Tools and Techniques……………………………………………………………………………………………………..15
Key Asset Prioritization Matrix………………………………………………………….15
Geographic Information Systems (GIS)….………………………………………………18
Critical Infrastructure Priorities at William and Mary………………………………………………………….23
First Priority: Sadler Center…………………………………………………………………………………..23
Second Priority: Swem Library……………………………………………………………………………..24
Third Priority: Wren Building……………………………………………………………………………….24
Summary of Critical Infrastructure Assessment…………………………………………………..…………..25
Best Practices for Conduction Risk Assessments………………………………………………………………..25
Role of Government and the Private Sector in Conducting Risk Assessments………………………..27
Tools and Techniques for Risk Assessments………………………………………………………………………28
Hazards U.S. Multi-Hazard……………………………………………………………………………………28
CARVER Matrix…………………………………………………………………………………………………28
Security Vulnerability Assessment…………………………………………………………………………29
Sadler Center Risk Analysis…………………………………………………………………………………………….30
Purpose………………………………………………………………………………………………………………30
Scope…………………………………………………………………………………………………………………31
Risk Assessment Approach…………………………………………………………………………………..35
Asset Characterization…………………………………………………………………………………………38
RISK ASSESSMENT WILLIAM AND MARY 4
Threat Statement………………………………………………………………………………………………….41
Findings……………………………………………………………………………………………………………..42
Fire………………………………………………………………………………………………………….42
Active Shooter………………………………………………………………………………………….46
Severe Weather…………………………………………………………………………………………47
Explosive………………………………………………………………………………………………….48
Assault/Violence……………………………………………………………………………………….49
Cyber Attack…………………………………………………………………………………………….51
Crime……………………………………………………………………………………………………….52
Surry Nuclear Power Plant Radiation Release……………………………………………….53
Abduction…………………………………………………………………………………………………54
Flood……………………………………………………………………………………………………….55
Asset-Based Security Vulnerability Analysis………………………………………………..56
Evaluating Risk……………………………………………………………………………………………………59
High Priorities…………………………………………………………………………………………..59
Medium Priorities……………………………………………………………………………………..60
Low Priorities……………………………………………………………………………………………62
Conclusion………………………………………………………………………………………………………….63
References……………………………………………………………………………………………………………………..64
RISK ASSESSMENT WILLIAM AND MARY 5
Critical Infrastructure
When creating a risk assessment for a locale, it is essential to identify the critical
infrastructure of the area. The USA PATRIOT Act defines critical infrastructure as “the
personnel, physical assets, cyber, and communications systems that must be intact and
operational to ensure survivability, continuity of operations, and mission success” (as cited in
Bennett, 2007, p. 53). Critical infrastructure can be evaluated within different scopes from a
national to a community level. An asset that is critical infrastructure at a local level may not be
considered as such at a state or national level. While the College of William and Mary has an
economic presence in the local community, it is not critical infrastructure nationally. However,
within the campus, there are key assets that are essential to the College’s operations and its
mission to educate. Through a risk assessment these assets can be evaluated and the critical
infrastructure for William and Mary can be identified.
Best Practices for Critical Infrastructure Identification
In completing a risk assessment, there are certain approaches to identifying critical
infrastructure that will provide the most comprehensive analysis. Bennett (2007) identifies three
key factors that should be considered when determining which infrastructure is critical:
dependencies, vulnerabilities, and alternatives (p. 57). First, some assets are interconnected in
their operations or provide services upon which other assets depend. If an asset fails that has
multiple dependencies, it can create a cascading effect, by incurring more losses than at the
initial site (Bennett, 2007, p. 63). Second, assets vary in the amount of vulnerabilities they have.
This can be related to their design and the services they provide. Some assets will be
characterized as soft targets, which have lower levels of security and more open access (Bennett,
2007, p. 62). Generally, assets that are for public use are soft targets because they can only have
RISK ASSESSMENT WILLIAM AND MARY 6
a certain level of security without interfering with the asset’s service (Bennett, 2007, p. 62). Hard
targets have higher security measures and less access (Bennett, 2007, p. 62). Since the services
they provide may be more critical, they are more desirable to attack (Bennett, 2007, p. 62). In
addition to those exploited in an attack, vulnerabilities must be considered that would cause risk
exposure in a natural disaster. The third factor refers to the presence of alternative resources
when an asset fails. If an asset’s services do not have built-in redundancies or cannot be
performed by another asset, then the asset is more critical (Bennett, 2007, p. 57). In determining
which assets are critical infrastructure, the dependencies, vulnerabilities, and alternatives should
be considered so that they can be appropriately prioritized.
Identifying critical assets is imperative, so the services they provide can be protected.
Failures of key assets can result in casualties, weakened security, economic turmoil, decline in
morale, and lack of access to basic needs (Bennett, 2007, p. 58). While it would be ideal to
protect all assets, limited resources prevent this. Therefore, critical infrastructure must be
assessed and prioritized to determine which assets warrant protective measures (Bennett, 2007,
p. 67). In order to produce the highest quality assessment, critical infrastructure identification
and prioritization should be conducted at the local level (Bennett, 2007, p. 67). A community is
the most knowledgeable regarding its assets and its essential needs. All of these assets may not
be considered critical in state and federal assessments, but a local jurisdiction can determine
which are most important to its community (Bennett, 2007, p. 67). To ensure best practices are
applied, communities should evaluate their critical infrastructure continuously to determine if
changes have occurred or priorities have shifted (Bennett, 2007, p. 67). To develop thorough
evaluations of critical infrastructure, numerous preparedness frameworks and assessment tools
can be applied.
RISK ASSESSMENT WILLIAM AND MARY 7
National Preparedness and Homeland Security Directives
The federal government has created numerous directives and documents that provide
mandates and guidance on best practices for national preparedness. Many of these documents are
interrelated or derived from another directive. In addition to providing direction for federal
agencies, the directives emphasize state and local level involvement. The intent is to provide a
framework that is scalable to different sized communities. Different documents address the
various phases of emergency management. Executive Order 13010, Executive Order 13231, the
National Infrastructure Protection Plan, Presidential Policy Directive 21, and Homeland Security
Presidential Directive 7 are examples of these documents that focus on critical infrastructure
protection.
Executive Order 13010
Issued in 1996, Executive Order 13010 addresses critical infrastructure protection.
Clinton identifies the sectors of critical infrastructure and categorizes potential threats as
“physical” or “cyber” (as cited in Bennett, 2007, p. 84). In this document, Clinton acknowledges
the role private stakeholders have in critical infrastructure, and he recognizes the need for
collaboration between the government and private sectors (as cited in Bennett, 2007, p. 84).
Through Executive Order 13010, Clinton established the President’s Commission on Critical
Infrastructure Protection, comprised of representatives of relevant federal agencies (as cited in
Bennett, 2007, p. 84). Clinton assigned the Commission the task of working with public and
private stakeholders to identify and assess critical infrastructure and their threats (as cited in
Bennett, 2007, p. 85). Clinton’s Executive Order also directs the Commission to use these
evaluations to create a national strategy to protect critical infrastructure (as cited in Bennett,
2007, p. 85).
RISK ASSESSMENT WILLIAM AND MARY 8
Executive Order 13231
With the continued development of technology, Executive Order 13231 was issued in
2001 to combat the cyber threats posed to critical infrastructure. Bush (2001) established the
President’s Critical Infrastructure Protection Board to develop security measures for information
systems of critical infrastructure. In order to execute this task, the Board needed to work with
other groups that manage cybersecurity threats, including federal agencies, state and local
governments, and the private sector (Bush, 2001). Executive Order 13231 was significant by
creating a policy to mitigate threats to critical infrastructure through their information systems.
National Infrastructure Protection Plan and Presidential Policy Directive 21
The National Infrastructure Protection Plan (NIPP) is designed to detail the methods by
which the public and private sectors can collaborate to mitigate risks and improve resilience for
critical infrastructure (Department of Homeland Security [DHS], 2015a). This plan was
developed from multiple perspectives, which included the public and private sectors from across
the nation and at all levels (DHS, 2015a). NIPP was crafted to be compliant with Presidential
Policy Directive (PPD) 21, which strives to promote a unified movement toward protecting
critical infrastructure from an all-hazards approach (The White House, 2013). NIPP outlines
steps that should be taken in order to execute the process of protecting critical infrastructure.
These include: setting goals and objectives, identifying infrastructure, assessing and analyzing
risks, implementing risk management activities, and measuring effectiveness (DHS, 2013, p. 15).
NIPP stresses the importance of information sharing during this process in order to promote best
practices and involve the entire community (DHS, 2013, p. 16). NIPP’s process can be used as a
guideline for assessing critical infrastructure in a community and determining which mitigation
efforts are worth employing.
RISK ASSESSMENT WILLIAM AND MARY 9
Homeland Security Presidential Directive 7
Homeland Security Presidential Directive (HSPD) 7 is an executive document that
provides a strategic framework for “critical infrastructure identification, prioritization, and
protection” (DHS, 2003). This document recognizes the presence of threats that must be
acknowledged and analyzed. HSPD-7 notes that it is not possible to protect against all threats
and key assets must be prioritized in order to create the most effective prevention (DHS, 2003).
In order to accomplish these goals, HSPD-7 outlines the critical infrastructure sectors that
different federal agencies should address, and it conveys the necessity of collaboration with the
private sector (DHS, 2003).
The College of William and Mary Profile
William and Mary is the second oldest college in the United States and is a research
university, with undergraduate, graduate, and doctoral programs (College of William & Mary
[William & Mary], 2015a). Chartered in 1693, the College is the origin of the first Honor Code
and Phi Beta Kappa (William & Mary, 2015a). The main campus is situated on 1,200 acres in
Williamsburg, Virginia (William & Mary, 2015a). It is separated from the surrounding
community and bordered by Richmond Road, Jamestown Road, and Lake Matoaka. Currently,
the population consists of 6,299 undergraduate students, 2,138 graduate students, and 609 full-
time faculty (William & Mary, 2015a). Thirty-one percent of students are of a minority ethnicity
or race (William & Mary, 2015a). William and Mary is a prominent academic institution
nationally and is also an economic force locally. “William and Mary contributes more than half a
billion dollars and over 7,000 jobs to Virginia each year” (William & Mary, 2015a). Any
incident, natural or manmade, at the campus would be significant to the College’s mission
RISK ASSESSMENT WILLIAM AND MARY 10
toward providing an environment for learning and research and would impact the surrounding
community of Williamsburg as well.
An All-Hazards Approach
Due to its location and the nature of its residential campus, William and Mary is more
prone to certain types of threats. Some of the events the College should prepare for are fire,
hurricanes, floods, winter storms, nuclear fallout, earthquakes, biological hazards, chemical
hazards, active shooters, terrorism, and cyber-attacks. Especially since William and Mary is a
residential campus, fires caused in the dorms or other buildings should be a concern. Due to the
campus’s location on the Virginia Peninsula, it is more likely to be impacted by hurricanes and
flooding. The lake on campus and surrounding wetlands make floods more probable. While
winter storms and earthquakes are less likely, they can and have had an impact on campus
operations. Across the James River and approximately seven miles from the campus, the Surry
Nuclear Power Plant’s location makes nuclear fallout a necessary incident to plan for, despite the
low level of likelihood of occurrence. Biological and chemical hazards should also be
considered, especially from the materials located in the science buildings. Since active shooters
have attacked other college campuses and terrorism can target unlikely soft targets, William and
Mary should also have shelter-in-place and evacuation plans. William and Mary’s classes are
primarily taught in classrooms, but they rely heavily on online services through applications,
such as Banner and Blackboard. Administrative services depend on information security as well.
If a successful cyber-attack occurs, the College’s activities and services could be impaired. These
natural and manmade hazards could cause negative consequences, such as financial loss,
casualties, inability to provide education and research services, loss of sensitive personal data,
and reputational damage. Since the college has a wide scope of potential incidents that could
RISK ASSESSMENT WILLIAM AND MARY 11
occur, it is necessary for it to take an all-hazards approach in order to ensure best practices are
carried out. This consists of developing emergency procedures that are adaptable to different
types of events.
William and Mary’s Critical Infrastructure
William and Mary’s campus consists of academic, residential, athletic, arts, activities,
and administrative buildings. Based on the amount of impact an incident could have in terms of
casualties, financial cost, loss of functions, and effect on dependent assets, the structures that are
critical infrastructure can be identified. There are several buildings which function as centers of
congregation. Some of these structures are filled to capacity on a daily basis. Others hold a
majority of the population during special events and are empty the remainder of the time.
Sadler Center
The Sadler Center contains one of the two major dining facilities and many of the
meeting rooms for activities. As a result, it is consistently filled throughout the day. In addition
to catering to the regular campus population, the Sadler Center hosts visitors and regional
conventions throughout the year. Therefore, the potential occupants exposed could rise higher
during special external events.
Swem Library
Swem Library is the main library for undergraduate and graduate students, and it is where
most students study on campus. The library is generally open from 8 a.m. until 2 a.m., so it is
especially full in the evenings when other buildings are closed. Swem Library contains all of the
reference documents and media for the main campus. In addition, it has the Special Collections
area, which holds rare, old, and significant documents. Swem Library also stores the College’s
historical regalia when they are not in use (William & Mary, 2015a).
RISK ASSESSMENT WILLIAM AND MARY 12
Wren Building
The Wren Building is the most iconic structure on campus. It is historically significant,
since it is the oldest academic building still in use in the United States (William & Mary, 2015a).
Williamsburg’s tourists visit the Wren Building daily. Religious services are held in the wing
containing the chapel. Ceremonies that involve the entire campus body are conducted inside the
building and in the adjacent yards. Many of the school’s relics are displayed in the Wren
Building.
Power Plant
The Power Plant is not accessed by much of the population, but it impacts the campus
through the resources it provides. Therefore, an incident would cause minimal casualties but
could cause a cascading effect on dependencies.
Commons Dining Hall
The Commons Dining Hall is the other main dining facility on campus. It caters to more
occupants than the Sadler Center at meal times, but does not contain any meeting space. Outside
of the designated meal time frames, the Commons Dining Hall is empty, except for some of the
culinary staff.
Law School
The Law School is distinct from many other academic buildings, because all law classes
are held in a single building. All of the law faculty and administrative offices are located there as
well. Law students have their own library, which is in a wing of this structure. Since all
components of the Law school are housed in one building, it is usually highly occupied.
RISK ASSESSMENT WILLIAM AND MARY 13
Zable Stadium
Zable Stadium hosts the William and Mary Football and Track and Field teams. The
stadium can hold 11,686 people. Outside of scheduled games, the stadium is unoccupied.
William and Mary Hall
William and Mary Hall is a large arena, where the Tribe Basketball team plays. The
structure also contains additional training rooms used by other sports. William and Mary Hall
consists of approximately 24,000 square feet and can hold 11,200 people (William and Mary,
2015). Since it is the largest indoor event space on campus, major events that involve the entire
campus population are held there.
Recreation Center
The Recreation Center is the only fitness facility on the campus. It is frequented by a
higher number of people during peak fitness times, which are usually in the late afternoon. The
Recreation Center also holds intermural games and fitness classes. Due to the expensive
equipment and the large number of occupants, the recreation center should be considered critical
infrastructure.
Campus Center
The Campus Center is a multipurpose structure, which consists of meeting and activity
spaces, administrative offices, a small theater, and a limited dining facility. Trinkle Hall is a
large room within the Campus Center and can hold almost 600 occupants (William and Mary,
2015).
Integrated Science Center
The Integrated Science Center is fairly large but is more critical for its potential to cause
a chemical or biological incident due to the materials it contains. All of the chemical labs for
RISK ASSESSMENT WILLIAM AND MARY 14
faculty and students are located in this building. There is also a large lecture hall.
Phi Beta Kappa/ Andrews Hall
Phi Beta Kappa Hall is a theater where performances take place. The theater has 763
seats and is used for plays, speeches, and dance shows (William & Mary, 2015a). Phi Beta
Kappa Hall is housed in a unique building, which also contains Andrews Hall. Although
constructed as one building, these two halls are separated internally. Andrews Hall is the location
of visual arts classes and contains specialty art equipment.
Small Hall
Small Hall is the physics building, where classes are held and faculty conduct research.
Small Hall has technical equipment, including high-powered lasers and a roof-top observatory
(William & Mary, 2015a).
School of Education
Similar to the Law School, all functions of the School of Education are held in a single
structure. The School of Education also has large meeting spaces, which are used to host campus
lectures and third party events.
Matoaka Amphitheater
Matoaka Amphitheater is an outdoor stadium located in the campus woods. It is used as
the venue for concerts and other entertainment. The amphitheater is enclosed by a perimeter so
that people who do not purchase tickets cannot enter events. The structure consists of some
standard theater seating and tiered areas of grass. In total, the area can contain 2,000 occupants
(William and Mary, 2015).
RISK ASSESSMENT WILLIAM AND MARY 15
Sunken Gardens
The Sunken Gardens is a large grassy area and a landmark on campus. Situated between
three academic building to the north and another three to the south, the Sunken Gardens is in a
central location. The portico of the Wren Building also overlooks the Sunken Gardens. This is
the most popular outdoor area for students to congregate. Major events, including school dances,
homecoming functions, and graduation ceremonies are held there. Therefore, an incident would
pose a minimal threat to the Sunken Gardens’ structure but could be detrimental if the area is
heavily populated.
Tools and Techniques
Key Asset Prioritization Matrix
A key asset prioritization matrix provides a tool to analyze the critical infrastructure of a
community and rank the structures in order of which would be most impacted in an incident. The
matrix uses four categories to determine the level of impact: occupants exposed, economic
impact, business or service interruption, and interdependencies (Bennett, 2007, pp. 70-71). Each
structure is evaluated for these criteria and assigned a number from zero (least impact) to four
(most impact). Occupants exposed refers to the maximum amount of people present at the
structure, and economic impact assesses the cost to repair damages (Bennett, 2007, p. 70).
Business or service interruption represents the amount of time necessary to restore services, and
interdependencies examines the amount of additional assets that are impacted by the original
incident (Bennett, 2007, pp. 70-71). The sum of these values provides a score, which can be used
to rank the total impact on that structure. In Table 1, these values are displayed in the far right
column. The table is organized by structures that are impacted the most to the least. Thus, an
incident involving the Sadler Center or Swem Library would be the most devastating to William
RISK ASSESSMENT WILLIAM AND MARY 16
and Mary’s critical infrastructure. This table provides a means to assess and prioritize critical
infrastructure but does not convey the exact figures for the categories. A quantitative study could
be used to further examine the precise potential impact to each structure.
An analysis of the risk factor categories in Table 1 can assist in the identification of
critical infrastructure. Factors that are more influential for a community will be identifiable
through trends in the key asset prioritization matrix. For William and Mary, the data suggests
that economic impact is the most significant, since it received generally higher scores than the
other factors. The critical infrastructure of the campus would be expensive to repair or rebuild.
Many of these structures house unique contents that are not available in other buildings on
campus and are costly to replace. For example, the ISC contains student and faculty chemistry
labs with specialized equipment, such as a mass spectrometer (William & Mary, 2015a). Within
Swem Library, William and Mary (2015) stores over two million documents, including some
which are irreplaceable in Special Collections. The key asset prioritization matrix indicates that
occupants exposed is also a prominent factor in determining critical infrastructure. With over
9,000 people present on campus daily, William and Mary (2015) is at risk for significant
causalities should an incident occur on campus. When the population congregates for activities,
including meals or convocations, the number of occupants in a single location increases
substantially. Using data for the locations of these events can aid in identifying critical
infrastructure. The services of William and Mary’s critical infrastructure do not provide life-
sustaining resources like a hospital would for a city. However, the services they do provide are
critical to the College’s education mission. If an incident occurs, it would interfere with the
ability to execute this mission. Since many of the buildings have specialized uses, it would be
difficult to relocate the population and continue the same activities. While the campus is
RISK ASSESSMENT WILLIAM AND MARY 17
dependent on the Power Plant, most structures operate independently. Therefore, a cascading
effect, in which additional critical infrastructure are impacted from an incident, would be
unlikely.
When using tools, it is important to consider that the level of objectivity obtained through
numerical values does not provide a perfect evaluation. For example, in the key asset
prioritization matrix in Table 1, the figures indicate that economic impact tends to be more
significant to William and Mary’s critical infrastructure than any of the other factors. This type
of tool weighs each of the factors equally in the total score. A certain level of subjectivity is still
necessary to ensure that the most important factors for specific critical infrastructure receive
greater attention. In William and Mary’s case, occupants exposed should be considered the most
critical factor because its people are most essential to its education mission. In, addition, the cost
of causalities is very high.
RISK ASSESSMENT WILLIAM AND MARY 18
Structure Occupants
Exposed
Economic
Impact
Business or
Service
Interrupted
Interdependencies Total
Sadler Center 4 4 3 3 14
Swem Library 4 4 3 3 14
Wren Building
(including Yard) 4 4 3 2 13
Power Plant 1 4 3 4 12
Commons 3 4 3 2 12
Law School 3 4 3 2 12
Zable Stadium 4 4 3 1 12
W&M Hall 4 4 3 1 12
Rec Center 4 4 3 1 12
Campus Center 3 3 3 2 12
Integrated Science
Center 3 4 3 1 11
Phi Beta Kappa/
Andrews Hall 3 4 3 1 11
Small Hall 2 4 3 1 10
School of Education 3 3 3 1 10
Matoaka
Amphitheater 4 3 2 1 10
Sunken Gardens 4 1 0 1 6
Table 1. Key asset prioritization matrix of William and Mary’s critical infrastructure.
Geographic Information Systems (GIS)
A Geographic Information System (GIS) is a tool that can help emergency managers
identify risks and evaluate effective responses to incidents. A GIS enables the user to view data
through mapping software, which can improve the ability to visualize and assess that data. (Esri,
n.d.). For example, in a hurricane, a GIS can be used to evaluate the potential trajectories of the
storm, identify the impact zones, determine effective evacuation routes, and estimate recovery
costs. A GIS provides a means to visually perceive data that is difficult or lengthy to articulate in
RISK ASSESSMENT WILLIAM AND MARY 19
words. In a risk assessment of a locale, a GIS is valuable for identifying critical infrastructure,
factors that complicate an incident, and appropriate response options.
There are a variety of different maps and data sets that can be used with a GIS software.
A base map functions as the main imagery on which other data can be projected. Examples of
different base maps include a road map and a terrain map. When additional data is added onto
the base map, they are referred to as “layers” (City of Williamsburg, 2015). Layers can identify
relevant content on the base map, such as waterways, schools, evacuation routes, and electrical
power plants and substations.
A GIS can be useful for evaluating risks and how to plan for them at the College of
William and Mary. It can aid in identifying critical infrastructure at the campus. The first step is
clearly defining the boundaries of the College. Figure 1 illustrates the distinct area of the campus
from the rest of Williamsburg. The red triangle demonstrates how Richmond Road borders the
campus to the north, Jamestown Road marks the boundary to the south, and Lake Mataoka acts
as the perimeter to the west. Since the campus is enclosed by clear edges, this assists in limiting
access to the campus and designing effective patrol routes. Figure 2 is a campus map of the
College. The color coding on this map identifies the different structures by type: academic,
administrative and support services, athletics and athletic events, arts and events, and student
housing and services. Being able to quickly recognize the types of buildings can help to
determine the population’s distribution throughout the day. Figure 3 is a pictometry map, which
provides a three-dimensional aerial view. This map is particularly useful to better comprehend
the terrain and altitudes of the structures and other features. Figure 4 uses a hybrid of a road and
terrain map as the base. This map’s data conveys the close proximity of the Surry Nuclear Power
Plant to William and Mary’s campus. The map depicts how direct the path across the river is for
RISK ASSESSMENT WILLIAM AND MARY 20
potential nuclear material versus the slower route for vehicles, which must take a ferry to cross
from one peninsula to the next. Figure 5 illustrates the different types of wetlands at William and
Mary and in the neighboring community. This map shows how the wetlands permeate the
campus grounds. The data from this map can be used to predict potential flood levels and to plan
alternate routes in the event of blocked routes. The use of a GIS would be beneficial to William
and Mary in its emergency planning. The variety of data sets that can be applied can contribute
toward an all-hazards approach.
Figure 1. Boundaries map of the College of William and Mary. (City of Williamsburg, 2015).
RISK ASSESSMENT WILLIAM AND MARY 21
Figure 2. Campus map of the College of William and Mary. (William & Mary, 2015a).
Figure 3. Pictometry map of the College of William and Mary. (Bing Maps, 2015).
RISK ASSESSMENT WILLIAM AND MARY 22
Figure 4. Proximity of the College of William and Mary to the Surry Nuclear Power Plant. (Map
Developers, 2015).
Figure 5. Wetlands map of the College of William and Mary. (U.S. Fish & Wildlife Service,
2015).
RISK ASSESSMENT WILLIAM AND MARY 23
Critical Infrastructure Priorities at William and Mary
First Priority: Sadler Center
Based on the assessment conducted, the Sadler Center is the most critical infrastructure at
William and Mary. The Sadler Center operates as a central hub on campus and serves more
diverse functions than any other building. These include its dining hall services and its use for
meeting and entertainment space. The most influential factor is occupants exposed. The formal
meeting space alone can hold approximately 3,500 occupants (William & Mary, 2015a). This
correlates to the highest score for the occupants exposed criteria in the key asset prioritization
matrix. If the Sadler Center became inoperable, it would also be devastating economically. The
dining hall renovation in 2013 cost $8 million (William & Mary, 2015a). The original cost to
build the Sadler Center was $12.5 million in 1994 (William & Mary, 2015a). If the entire
structure had to be replaced, the Sadler Center would qualify for the highest ranking in the
economic impact criteria of the key asset prioritization matrix. The Sadler Center would also
cause significant service interruption to the campus, since it provides critical dining services.
During meal times, waiting lines are already present at both dining halls. The Commons Dining
Hall does not have the resources to provide effectively for the entire student body. The original
construction of the Sadler Center took place over two years, so a significant reconstruction
period could be expected if it was destroyed (William & Mary, 2015a). An incident would also
have an impact on other assets. One example is the campus mail system. All mail directed to and
from within the campus is handled at the Sadler Center. If this system became inoperable, there
would be a lapse in campus communications for other assets. Overall, the Sadler Center’s total
score for the key asset prioritization matrix is a fourteen. Bennett (2007) conveys that a score
between ten and sixteen indicates that the asset is of “high importance” and is a “highly desirable
RISK ASSESSMENT WILLIAM AND MARY 24
target” (p. 71). Due to its high score and its multiple services, the Sadler Center is the most
critical infrastructure.
Second Priority: Swem Library
Swem Library is the second priority on campus and also received a total score of fourteen
in the key asset prioritization matrix. Swem Library is also most critical for its occupants
exposed. Swem Library is the main library and primary study location. As a result, it is normally
heavily occupied. The large structure and vast number of documents would make the economic
impact significant in a disaster. Some of the rare documents in Special Collections are
irreplaceable. The library serves as a major resource and information provider for all academic
disciplines. Despite having the same total score as Swem Library, the Sadler Center should be
the first priority because the number of occupants exposed is higher. This factor should be
weighed heavily, since the students and faculty are the most fundamental element of the
College’s mission.
Third Priority: Wren Building
The Wren Building also had a high total score of thirteen in the key asset prioritization
matrix and should be the third priority. During major events, the Wren Building and the adjacent
yards are filled with people. One example is the annual convocation ceremony. Depending on the
threat, the occupants in the yard may or may not be equally at risk as those inside the building.
The Wren Building is a historical landmark and would require careful restoration practices
should it need repair or rebuilding. Damage to the structure would also be detrimental to the
College’s morale. The Wren Building does not have dependencies, but its periodic high
occupancy and historical value make it a key asset over other structures on campus.
RISK ASSESSMENT WILLIAM AND MARY 25
Summary of Critical Infrastructure Assessment
In order for the College of William and Mary to complete a successful risk assessment
and ensure it is prepared, it must first identify its critical infrastructure. Determining the
criticality of the assets should be conducted at the local level and can be guided by the
framework of the national preparedness and homeland security directives. Through the use of
tools, such as qualitative and quantitative data, key asset prioritization matrix, and GIS, the
College can assess its critical infrastructure and prioritize its resource allocation. Since it is a
public school, William and Mary has financial constraints and relies on government funding and
private contributions to support its activities. By evaluating its priorities, it can direct these funds
where they are most needed and where they will have the most impact. The College of William
and Mary should maintain an all-hazards approach to best prepare for the many types of
incidents that could occur on its campus. By applying these strategies and working with the local
community of Williamsburg, Virginia State government, and the private sector, William and
Mary will be implementing best practices.
Best Practices for Conducting Risk Assessments
In order to conduct a risk assessment, several steps must be taken. These include
identifying key assets, determining asset value, recognizing threats to the assets, performing a
risk screening, executing a vulnerability assessment, analyzing the level of risk, implementing
appropriate countermeasures, and re-evaluating (Bennett, 2007, p. 216). This process is known
as the cycle of identification and protection of critical infrastructure and is illustrated in Figure 6
(Bennet, 2007, p. 216).
Key assets include resources that that are valuable to the mission of critical infrastructure
(Bennett, 2007, p. 217). According to Bennett (2007), there are two aspects to determining key
RISK ASSESSMENT WILLIAM AND MARY 26
assets: goods or services provided and components that are critical to the jurisdiction (p. 218).
Once the key assets have been identified, they can be valued and prioritized through a risk
screening. This step ranks the key assets based on the impact an incident would cause (Bennett,
2007, p. 264).
A threat assessment is critical to executing a successful risk assessment. This stage of the
process includes determining potential adversaries, their capabilities, and the probability that an
incident will occur (Bennett, 2007, p. 221). The vulnerabilities, weaknesses that can be exploited
by a threat, for each asset should also be considered (Bennett, 2007, p. 216). These factors are
used to calculate risk, which is defied by the equation “Risk = (Value) x (Vulnerabilities) x
(Threats) x (Likelihood) x (Consequence)” (Bennett, 2007, p. 227). Risk can be evaluated
quantitatively or qualitatively depending on the needs of the jurisdiction. A quantitative risk
analysis provides a measurable, numeric approach but context may be lost without description
(Bennett, 2007, p. 229). A qualitative risk analysis allows for quick prioritization of
improvements, but it makes cost-benefit analysis more challenging without numerical values
(Bennett, 2007, p. 232).
Next, it must be determined whether the level of risk is acceptable (Bennett, 2007, p.
228). Existing countermeasures should be assessed for their effectiveness. If residual risk is
present, improvements should be considered (Bennett, 2007, p. 239). Through the use of cost-
benefit analysis, officials can determine whether the level of risk reduction is worth the cost of
adding, removing, or changing countermeasures (Bennett, 2007, p. 292). Finally, the
reevaluation of risk should occur to measure the actual levels of risk reduction after
countermeasures were introduced (Bennett, 2007, p. 242). The cycle of identification and
RISK ASSESSMENT WILLIAM AND MARY 27
protection of critical infrastructure should be continuous to manage dynamic vulnerabilities and
risk.
Figure 6. Cycle of identification and protection of critical infrastructure. (Bennett, 2007, p. 216).
Role of Government and the Private Sector in Conducting Risk Assessments
In order to manage risk effectively, the public and private sectors must collaborate.
According to Bennett (2007), both sectors can benefit from sharing resources and information (p.
321). Formal relationships and agreements promote success in coordinated efforts (Bennett,
2007, p. 322). The public and private sectors should consult one another when conducting risk
assessments and should hold joint drills and exercises (Bennett, 2007, p. 322). Many potential
threats pose risks that extend beyond the scope of a single asset. Private organizations and the
government must be aware of the interdependencies of their critical infrastructure. The private
sector must not rely on the public sector alone to assess and protect its critical infrastructure
(Bennett, 2007, p. 323). However, the public sector does provide services and tools that the
private sector can utilize. For example, the Federal Emergency Management Agency (FEMA,
RISK ASSESSMENT WILLIAM AND MARY 28
2015b) allows federal, state, local government, and the private sector to download its HAZUS-
MH software at no cost. DHS (2015b) manages another resource, the Regional Resiliency
Assessment Program (RRAP), which coordinates multiple stakeholders in critical infrastructure
assessment. DHS (2015b) chooses projects that are designed to assist in the process of
identifying critical infrastructure, assessing risk, and increasing resilience. Federal agencies, law
enforcement, emergency response organizations, the private sector, and academic institutions are
involved with information sharing for RRAP (DHS, 2015b). Continued communication and
collaboration between the public and private sectors is beneficial to best practices for risk
assessments.
Tools and Techniques for Risk Assessments
Hazards U.S. Multi-Hazard
The Federal Emergency Management Agency (FEMA, 2015b) offers a methodology,
HAZUS, which uses GIS data to estimate impacts from earthquakes, floods, and hurricanes.
HAZUS can be used to identify the risk to critical infrastructure from these threats (FEMA,
2015b). This technology can be useful in conducting a risk assessment by supplying data about
these risks that can be used to develop appropriate countermeasures. Two of the software tools
FEMA (2015a) offers, the Hazus-MH Risk Assessment Tool (RAT) and the Hazus-MH Flood
Macro Wizard, are designed to assist local use (FEMA, 2015a).
CARVER Matrix
The CARVER matrix is used in risk assessments to identify critical assets, potential
threats, and vulnerabilities (Bennett, 2007, p. 244). Each of the letters represents a selection
factor, which is ranked on a scale of one to ten (Bennett, 2007, p. 244). The sum of the numerical
values assigned to each selection factor provide a total risk value for each asset (Bennett, 2007,
RISK ASSESSMENT WILLIAM AND MARY 29
p. 250). Using these total values, the assets can be ranked from most vulnerable to least
vulnerable. Higher values indicate assets with greater levels of risk (Bennett, 207, p. 250). The
selection factors include: criticality, accessibility, recuperability, vulnerability, effect, and
recognizability. Criticality signifies the extent of impact to a greater system if the asset were
damaged. Assets that are more critical are more desirable targets for manmade threats (Bennett,
2007, p. 244). Accessibility indicates the “ease of access” to an asset (Bennett, 2007, p. 244).
This can be direct physical access or indirect, such as electronic access. Recuperability measures
the time necessary to reestablish the services of a critical asset. This can be achieved through
repairing the existing asset or by creating a way to restore services without that asset (Bennett,
2007. p. 245). Vulnerability refers to the likelihood of significant damage to an asset. This is
based on the features of the asset, preventative measures, and the capability of a threat (Bennett,
2007, p. 245). Effect characterizes an incident’s potential impact in terms of “scope and
magnitude” (Bennett, 2007, p. 245). Recognizability describes the probability that an asset is
distinguishable from another asset. This is determined from the features of the asset, its level of
uniqueness, and technology that may be available to identify the asset (Bennett, 2007, p. 247).
Security Vulnerability Assessment
A Security Vulnerability Assessment (SVA) is a risk assessment used to determine
critical infrastructure, vulnerabilities, and the effectiveness of security countermeasures (Bennett,
2007, p. 256). This type of assessment uses qualitative data to analyze these factors and how they
impact the risk posed to a critical asset (Bennett, 2007, p. 256). The steps to conducting an SVA
include planning, asset and risk characterization and screening, threat identification, vulnerability
analysis, security countermeasures assessment, drill and exercise, and re-evaluation (Bennett,
2007, pp. 260-268). An SVA can be used to assess natural or manmade threats as a preventative
RISK ASSESSMENT WILLIAM AND MARY 30
measure or in the aftermath of an incident. There are two methods for executing an SVA: the
scenario-based approach and the asset-based approach. Bennett (2007) describes a scenario-
based approach as a detailed analysis, which involves evaluating the risk associated with each
situation a threat might present as (p. 266). Alternatively, an asset-based approach produces more
immediate recommendations through the analysis of the risk posed to key assets by potential
threats with consideration for existing countermeasures (Bennett, 2007, p. 267). Jurisdictions
should select the most appropriate approach to an SVA based on their needs and resources.
Sadler Center Risk Analysis
Purpose
Determined through the analysis of the Key Asset Prioritization Matrix, the Sadler Center
ranks as the most critical infrastructure for the College of William and Mary. In order to ensure
the protection and operation of the Sadler Center, a risk analysis of the infrastructure is
necessary. Conducting this risk analysis includes identifying key assets, assessing vulnerabilities,
recognizing threats and their potential impacts, determining the likelihood of incidents, and
implementing countermeasures as appropriate.
The mission of the Sadler Center is “to provide excellent facilities, equipment, service,
and assistance to all members of the College community for their events and activities” (William
& Mary, 2015a). To this objective, the staff offers event and meeting services, which include
scheduling and planning, audio and visual support, equipment installation, and advertising
(William & Mary, 2015a). The Sadler Center hosts a variety of events, such as organizations’
meetings, dances, performances, ceremonies, community outreach activities, and conferences.
The building houses a main dining hall and additional food options. However, the services of the
Sadler Center extend beyond its formal uses for event and dining services. The building acts as a
RISK ASSESSMENT WILLIAM AND MARY 31
main center for students to congregate, study, and relax. While it is a far newer structure
compared to the iconic Wren Building, the Sadler Center has become a key component of
William and Mary’s identity.
Scope
Located at 200 Stadium Drive, the Sadler Center is situated in the middle of campus and
serves as a common space as well as a thoroughfare connecting the different sections of campus.
The Sadler Center’s functions are the most diverse of the infrastructure on campus. Depicted in
Figure 7, Level 1 consists of the post office, a games room, fast food selections, a small stage
and seating area (Lodge 1), catering services, a convenience store (Student Xchange), and a
loading dock. Located on Level 2 (Figure 8) are three meeting rooms (James, York, and Colony
Rooms), an auditorium, the information desk, administrative offices, a Wells Fargo ATM, a
study/computer lounge, the dining hall, the kitchen, and an open seating area. Displayed in
Figure 9, Level 3 has meeting space that can be made into as few as two rooms and up to five
rooms with dividers (Chesapeake A, B, and C and Tidewater A and B). A central spiral staircase
connects the three floors as shown in Figure 12 and Figure 13. Two elevators are also available.
Each floor has restrooms and access to emergency exits directly or through stairwells. There are
three regular entrances: one by the Post Office and another by Lodge 1 (Figure 11) on Level 1
and a third near the information desk on Level 2.
The Sadler Center is open during the academic year from 7:00 a.m. to 12 a.m. Monday
through Thursday, 8:00 a.m. to 2:00 a.m. Friday through Saturday, and 7:30 a.m. to 12:00 a.m.
on Sunday (William & Mary, 2015a). During school breaks, the building maintains reduced
hours from 8:00 a.m. to 5:00 p.m. Monday through Friday and is closed on the weekend
(William & Mary, 2015a). In the summer, the Sadler Center is open from 8:00 a.m. to 10:00 p.m.
RISK ASSESSMENT WILLIAM AND MARY 32
every day (William & Mary, 2015a). Outside of the designated hours, all entrances are locked
and security personnel patrol the area periodically.
Figure 7. Directory map of Level 1 of the Sadler Center.
Figure 8. Directory map of Level 2 of the Sadler Center.
RISK ASSESSMENT WILLIAM AND MARY 33
Figure 9. Directory map of Level 3 of the Sadler Center.
Figure 10. Directory map key for the Sadler Center.
RISK ASSESSMENT WILLIAM AND MARY 34
Figure 11. Lodge 1 located on Level 1 of the Sadler Center.
Figure 12. Level 2 of the Sadler Center.
RISK ASSESSMENT WILLIAM AND MARY 35
Figure 13. Level 3 of the Sadler Center.
Risk Assessment Approach
While the Sadler Center has experienced threats and minor incidents, no major situations
have occurred. Due to its location on the Virginia Peninsula, the campus has faced multiple
hurricanes. Other weather systems, including tornado watches and winter storms have also
impacted the region (William & Mary, 2015a). The Sadler Center has suffered resultant power
outages but has not sustained any significant structural damages. In, 2011 the campus felt the
effects of the 5.9 earthquake originating in Louisa County, but the Sadler Center was not
impacted (William & Mary, 2015a).
There have been notable violent crimes within the perimeter of the Sadler Center. In
2009, assailants unassociated with the College assaulted and attempted to rob four students on
the terrace of the Sadler Center (Figure 14) (The Flat Hat, 2009a). Only two days later, a student
was stabbed during the daytime on a path on the south side of the Sadler Center (Figure 15) (The
RISK ASSESSMENT WILLIAM AND MARY 36
Flat Hat, 2009b). In both instances, the Flat Hat (2009a; 2009b) reported that the perpetrators
fled after the attacks.
The administration has also received significant threats against the Sadler Center. In
2008, William and Mary Police collaborated with the FBI, Virginia State Police, Williamsburg
Police, and James City County Police to investigate a threat foreshadowing violence at the Sadler
Center (William & Mary, 2015a). As a precaution, the building was closed early on the day the
threat referenced and events were moved to alternate locations (William & Mary, 2015a). In
2011, a witness informed police about two suspicious individuals in the Sadler Center who might
be armed (William & Mary, 2015a). In 2015, William and Mary (2015) received multiple emails
threatening the campus with bomb threats. In all three cases, the threats were determined to be
unsubstantiated (William & Mary, 2015a).
The campus has also faced public health instances, including a student with MRSA in
2007, multiple members of the community with H1N1 flu symptoms in 2009, and a student with
viral meningitis in 2013 (William & Mary, 2015a). While no major outbreaks occurred, the
Sadler Center must be aware of the potential hazards that could occur in the building since it is a
central locality on campus.
The services of the Sadler Center are reliant on a functioning computer network, which
suffered heightened levels of virus attacks from 2003 to 2004 (William & Mary, 2015a).
Although the Sadler Center has not experienced any significant effects from these incidents, they
serve to advise campus officials on the types of events that could occur at the Sadler Center and
on the preparations that must be made in case they do happen. Therefore, this risk assessment is
conducted in anticipation of the occurrence of any incidents, including the aforementioned.
RISK ASSESSMENT WILLIAM AND MARY 37
Figure 14. The terrace outside of the Sadler Center where four students were assaulted in 2009.
Figure 15. Path on the south side of the Sadler Center where a student was stabbed in 2009.
RISK ASSESSMENT WILLIAM AND MARY 38
Asset Characterization
In order to identify and prioritize the key assets of the Sadler Center, a risk screening
must be completed. Based on the services of the Sadler Center, one of its key assets is its
occupants, including students, faculty, staff, and visitors. The structure, the utilities, and the
computer network are also key assets. Using the Key Asset Screening Assessment in Table 2,
these assets are evaluated for the impact that an incident would have on each. These factors
include casualties, environmental impact, economic impact, business impact, and infrastructure
impact. The criteria for scoring each of these factors is detailed in Table 3. These factors are also
weighted to assign higher significance to the respective impacts. The weight applied to each
factor is listed in Table 4. All of these components contribute to a total weighted score, which
allows the key assets to be prioritized. This tool can then be used to help determine which
countermeasures to implement.
Casualties Environmental
Impact Economic
Impact Business Impact
Infrastructure Impact
Weighted Score
Structure 3 2 2 3 2 37
People (Students,
Faculty, Staff, & Visitors) 3 0 2 2 2 27
Utilities 0 1 1 1 1 10
Network 0 0 1 1 3 8
Table 2. Key asset screening assessment for the Sadler Center.
RISK ASSESSMENT WILLIAM AND MARY 39
Score Casualties Environmental
Impact Economic
Impact Business Impact
Infrastructure Impact
0 None expected Not applicable/ biodegradable
No significant effect likely
Startup facility with minor
changes
No effect on operations
1
Non-life-threatening
injuries likely both on and off
the key asset property
Will not leave the key asset's property
Impact on division or
business unit profitability
>10%
Facility shut down and unable to
provide products or services for
less than 1 month
Damage limited to the specific building/ area
only
2
Life-threatening injuries likely
both on and off the key asset
property
Likely to leave the key asset's property;
however, non-persistent and no decontamination
and/or remediation required
Impact on corporate
profitability >10%
Facility shut down and unable to
provide products or services for
less than 6 months
Damage to support
systems and/or utilities
3 On-site fatalities
likely
Likely to leave the key asset's property;
however, non-persistent and
decontamination and/or remediation
required
Impact on U.S.
economy
Facility shut down and unable to
provide products or services for
less than 1 year
Damage to other
production or service facilities
4 Off-site fatalities
likely
Likely to leave the key asset's property; persistent and long-
term remediation required
Impact on world
economy
Facility destroyed and not expected
to be rebuilt
Damage to the entire site
Table 3. Scoring criteria for impact factors of the key asset screening assessment.
Impact Weighting Factors
Casualties Rating x 5
Environmental Rating x 4
Economic Rating x 3
Business Rating x 2
Infrastructure Rating x 1
Table 4. Weight applied to impact factors of the key asset screening assessment.
RISK ASSESSMENT WILLIAM AND MARY 40
An analysis of the Key Asset Screening Assessment (Table 2) indicates that the Sadler
Center’s most highly prioritized asset is its structure. Receiving a weighted score of 37, the
structure is fundamental to Sadler’s dining and event services. An incident that causes significant
damage to the structure would likely cause substantial casualties and would render the building
inoperable for an extensive period. Building repairs would be costly and business from hosting
events would decrease. Audio and visual equipment located in the Sadler Center would not be
able to be deployed to other areas of campus.
The students, faculty, staff, and visitors of the Sadler Center received a weighted score of
27. Overall, people are most essential to the College’s mission and are also important to the
function of the Sadler Center. If an incident impacted the people within the Sadler Center,
business operations would suffer reputational damage that would deter the community from
booking events at the site. Loss of dining staff and event employees would cause a temporary
inability for the Sadler Center to provide these respective services.
Utilities are also a key asset with a weighted score of 10. Failure of utilities, such as
power or water, would prevent the Sadler Center from operating food services and business,
holding events, and allowing the community to use the lounge spaces. Services would be easier
to relocate and restore more quickly in the event of a utilities failure rather than loss of structure
or people.
The computer network ranked as the lowest priority of the key assets with a weighted
score of 8. The network is essential for operations across campus and assists in business
transactions, meal plan tracking, and presentations at the Sadler Center. A network failure would
interrupt these services, but would have minimal reputational damage and no casualties.
RISK ASSESSMENT WILLIAM AND MARY 41
Prioritizing the key assets of the Sadler Center contributes to identifying vulnerabilities, threats,
and appropriate countermeasures.
Threat Statement
To protect the Sadler Center, its vulnerabilities need to be identified and the potential
threats that might exploit these vulnerabilities must be recognized. According to Bennett (2007),
potential adversaries should be determined and can include insiders, outsiders, or outsiders in
collusion with insiders (p. 266). The Sadler Center is a soft target, characterized by its open
access to the community. This makes the range of Sadler Center’s potential adversaries
extensive, since the general public uses the building on a daily basis. In a broader scope
extending beyond the campus, the Sadler Center would not be identified as a high profile target.
However, within William and Mary’s campus, the Sadler Center’s central location, significance
to the College, and high occupant capacity make it an attractive target. Due to its general location
and characteristics, it is also at risk for natural hazards.
According to the College of William and Mary Emergency Management Team (2010),
fire, hazardous materials incident, pressure vessel implosion/explosion, tornado/severe weather,
terrorism, and shots fired/armed intruder on campus are the most probable threats to the College
overall, but an “all hazards perspective” is maintained (p. 4). Specific to the Sadler Center,
severe weather could cause structural damage, casualties, and loss of utilities. A fire, explosive,
assault, or flood could impact the structure and result in injuries or deaths. A radiation release at
the Surry Nuclear Power Plan could contaminate the Sadler Center and create related medical
emergencies for the building’s occupants. An active shooter event could produce significant
casualties, while an abduction could impact people on an individual level. The Sadler Center is
also at risk for cyber attacks, which could cause the network to fail and thereby prevent food
RISK ASSESSMENT WILLIAM AND MARY 42
services, business transactions, and event services from fully operating. While crimes, such as
vandalism or theft, would not affect the Sadler Center’s key assets to the extent of other
incidents, they could cause minor loss or damage to the structure or its equipment.
Findings
Fire. The Sadler Center faces the threat of fire, which is heightened by the presence of
kitchens for the dining hall and fast food services in the building. Fire most likely would be an
accidental threat, such as one caused by an electrical malfunction or cooking, but arson is
possible as well. Unlike dorm rooms on campus, the Sadler Center permits the use of candles,
but explicit approval must be attained for events. Currently, the Sadler Center is well-prepared
for a fire. Each floor has pull alarms, warning lights, smoke detectors, sprinklers, fire
extinguishers, and exit signs illuminated with red lights. Each floor has emergency exits or
labeled stairs that lead to an exit. As shown in Figure 16, the Sadler Center has a visibly marked
Fire Department Connection (FDC) next to the post office entrance on Level 1 on the west side
of the building. Instructions for community members who are in a fire are available through the
Emergency Response Plan and the In Case of Crisis mobile application displayed in Figure 17
(William & Mary, 2015b). The Rave Guardian mobile application can also be used to
immediately call police and alert them to the location of the fire. The Sadler Center has an
appointed building coordinator who educates employees about evacuation routes, serves as a
liaison with the Emergency Management Team, and assists in response to emergencies (William
& Mary, 2015a). The College is also prepared to establish a call center in the event of a major
fire (William & Mary, 2015a).
While the Sadler Center has implemented beneficial countermeasures, some could be
improved with increased signage. As exhibited in Figure 18, the fire extinguishers are present
RISK ASSESSMENT WILLIAM AND MARY 43
but not immediately apparent because there are no signs indicating their location. By placing
signs on the wall that indicate the presence of the fire extinguishers, people will be able to
recognize and retrieve them more quickly. In addition, there is a stairwell on the west side of the
building that leads to the exit by the Post Office on Level 1. It is the closest exit for occupants of
the James Room, York Room, the upper level of the Commonwealth Auditorium, and the
restrooms on Level 2 and Tidewater A and B on Level 3. There are exit signs in front of the
double doors leading to the stairwell on both floors, but the signs are concealed from the
occupants of the aforementioned rooms because the stairwell is around a corner at the end of the
hall (Figure 19). Installing additional exit signs in the adjacent hallways will permit people to
find this stairwell. This would assist in preventing a bottleneck at another exit and would aid
those whose access to other exits is restricted by fire. The Sadler Center could also improve its
use of maps. Building evacuation routes are not visible in the main areas and should be
prominently displayed. The directory maps (Figures 7-9) should be updated to provide accurate
information. The map displays a phone booth that no longer exists on Level 1, and the directory
map key (Figure 10) references a TV lounge which has been converted into additional space for
the dining hall. As an additional countermeasure, the Sadler Center can promote the use of drills
with the Williamsburg Fire Department.
RISK ASSESSMENT WILLIAM AND MARY 44
Figure 16. Visible Fire Department Connection (FDC) near the south entrance.
Figure 17. Emergency Response Guide home page displayed in the In Case of Crisis mobile app.
(William & Mary, 2015b).
RISK ASSESSMENT WILLIAM AND MARY 45
Figure 18. Fire extinguishers are present but not well-marked.
Figure 19. Sign for emergency exit is not visible from west hallway on Level 3.
RISK ASSESSMENT WILLIAM AND MARY 46
Active shooter. The Sadler Center is also at risk of an active shooter event. While
William and Mary has not faced this type of event previously, it has occurred on other college
campuses. An active shooter has the potential to cause mass casualties. When the Sadler Center
is holding events in the auditorium or meeting rooms, this building becomes an attractive target.
Peak meal times would also be seen as desirable as well. Notably, Monday evenings at dinner
time are well-known to the campus community as a period when the Sadler Center is
consistently at its highest occupancy. Typically, all of the meeting rooms are booked at this time
for weekly sorority chapter meetings. The meetings coincide with the popular dinner hour
between 6 p.m. and 7 p.m. As a result, the Sadler Center is full on all floors. The highest levels
of occupancy could create a bottleneck effect at the emergency exits in the larger rooms. The
current countermeasures include utilization of the siren system, mass notification messaging
system, and social media to alert the campus community to the incident as soon as possible
(William & Mary, 2015a). The In Case of Crisis mobile application provides guidelines for those
experiencing an active shooter event (William & Mary, 2015b). The Rave Guardian mobile
application can also be used to quickly alert police. The building coordinator would assist in
managing the crisis if it occurs within the building (William & Mary, 2015a). The College would
also establish a call center to manage inquiries (William & Mary, 2015a). For prevention,
concerned community members can report threatening behavior to the Campus Assessment and
Intervention Team (CAIT), who will monitor and manage cases without direct confrontation
(William & Mary, 2015a).
The existing countermeasures are appropriate for an active shooter event but would
benefit from greater awareness. CAIT provides a resource with the potential to recognize an
event before it occurs, but it relies on information collection by the public. CAIT should seek to
RISK ASSESSMENT WILLIAM AND MARY 47
promote its mission and educate the campus community about its important role. It is imperative
that CAIT emphasizes its intent is not to punish those reported (William & Mary, 2015a).
Furthermore, CAIT must assure the community that retaliation will not occur so people will feel
safe in making reports. While the In Case of Crisis mobile application details the principles of
“run,” “hide,” and “fight” for an active shooter event, the college community would benefit from
education about these concepts prior to an incident (William & Mary, 2015b). People involved in
this type of event may not have time or access to read the information in the application.
Response drills for an active shooter at the Sadler Center could also be held at random like fire
drills.
Severe weather. Due to its geographical location and historical precedence, the Sadler
Center is most likely to be impacted by severe weather, including hurricanes, tornadoes, and
winter storms. Depending on severity, a natural disaster could cause significant structural
damage, casualties, and loss of utilities. Unlike other buildings on campus, the Sadler Center’s
landscaping is minimal, so it is unlikely to sustain structural damages from falling trees or limbs.
The building contains a significant amount of windows, but they do not open. Currently, in the
event of severe weather, the siren system, mass notification messaging system, and social media
would be employed (William & Mary, 2015a). The building coordinator would help to prepare
the Sadler Center for an incoming storm and would arrange for the back-up generators to be set-
up (William & Mary, 2015a). The In Case of Crisis mobile application also provides instructions
for severe weather (William & Mary, 2015b). A call center would also be established if
necessary. In the event that an evacuation is declared, students can follow the evacuation plans
they are required to submit annually. In the past, students have also created an unofficial system
for offering and finding transportation and shelter through online posts.
RISK ASSESSMENT WILLIAM AND MARY 48
The countermeasure of requiring each student to have an evacuation plan in advance
could be implemented more effectively. Currently, the Banner system is used to prevent students
from registering for classes until they have confirmed their emergency contact information and
evacuation plans (William & Mary, 2015a). After the first time students have provided the
information, they only must select a confirmation button to complete the requirement in
subsequent years. Students do not want to be denied from course registration and are
consequently incentivized to bypass the emergency planning section as soon as possible without
proper review. Since William and Mary requires two evacuation locations, one that is nearby and
one that is distant, most students will need to create at least one plan that does not include their
home residence. Since the student body and relationships change over the course of college,
these plans can become outdated and unlikely to be carried out in an actual emergency. Instead,
students should be prompted to restate their evacuation plans annually rather than only confirm
them. This will promote critical consideration amongst students, who can then create more
realistic evacuation plans. This will also produce a more accurate record of students’ locations
after an evacuation. Since each incident can create unexpected circumstances, it would also be
beneficial for students to have a more formalized method to ascertain transportation and shelter.
Since students have already used informal and disorganized means to do so, they would probably
be willing to use an official service. The College could develop a formal web application that
would allow students to match based on occupancy offered/needed for transportation and shelter
purposes.
Explosive. Bomb threats have occurred before but have not been fulfilled. An explosive
device could be placed in the building by someone with individual interests or terrorist
connections. The bomb could be brought into the building or concealed within a package in the
RISK ASSESSMENT WILLIAM AND MARY 49
post office. A successful attack could result in catastrophic structural damage and casualties.
Currently, the siren system and mass notification messaging system would be used in this
situation (William & Mary, 2015a). The In Case of Crisis mobile application provides
information for bomb threats and the handling of suspicious packages (William & Mary, 2015b).
Police could also be contacted via the Rave Guardian mobile application. The building
coordinator would take a leadership role in assessing the situation and working with the
Emergency Management Team if an explosive was suspected or confirmed to be located within
the Sadler Center (William & Mary, 2015a). A call center would also be established during an
incident involving explosives (William & Mary, 2015a).
Potential additional countermeasures include reinforcing critical structural points so that
the Sadler Center could withstand an explosive. This could allow for additional occupants to
survive and possibly escape. The Sadler Center could also employ random vehicle checks at the
loading dock, which is frequented by vendors. This would promote a heightened sense of
security without creating a predictable routine. Post Office employees should also be encouraged
to review warning signs and procedures for handling suspicious packages.
Assault/violence. Assaults and violence have been threatened and have occurred in the
immediate area surrounding the Sadler Center. An assault could be perpetrated by a member of
the college community or an outsider. The Sadler Center and the terrace (Figure 14), the patio
area outside of Level 1, are popular areas for protests. Both student groups and outside parties
have held rallies in the vicinity. If an event were to escalate into a riot, violence could occur.
These types of incidents could result in casualties and loss of future business if the Sadler Center
develops a reputation as a dangerous location. Currently, campus security patrols the area
periodically throughout the day with an increased presence in the evening. Student events held in
RISK ASSESSMENT WILLIAM AND MARY 50
the Sadler Center meeting rooms are required to register with the Student Leadership
Development office (William & Mary, 2015a). This creates a record of events and participants
and provides forewarning of events that may be targeted or controversial. Depending on the size
of these events, the Student Leadership Development office may require the organizations to hire
security through a hiring agency, R.M.C. Staffing (William & Mary, 2015a). Organizations that
are not required are given the option to request security as well (William & Mary, 2015a). An
assault/violence specific to the Sadler Center would involve participation of the building
coordinator and the formation of a call center if the event was significant enough (William &
Mary, 2015a). Community members can also take advantage of the resources provided by the In
Case of Crisis mobile application, the Rave Guardian mobile application, and CAIT. People who
are concerned for their safety have the option of requesting a police escort at night (William &
Mary, 2015a).
The existing countermeasures are appropriate and the incidence of assault/violence at the
Sadler Center and the immediately surrounding area is low. To strengthen these countermeasures
further, the College should encourage student use of the Rave Guardian mobile application and
reports to CAIT. In the 2009 incidence involving the stabbing of a student during the daytime,
the police were not notified immediately (The Flat Hat, 2009b). Victims need to be educated
about the resources available and should feel compelled to make reports. During controversial or
vulnerable rallies, security personnel could have an increased presence in the area. This could
help with crowd management without creating an intimidating environment. The Sadler Center
lacks any internal or external cameras, except for one located within the Wells Fargo ATM on
Level 2. Installing cameras connected to a closed circuit television system would increase the
RISK ASSESSMENT WILLIAM AND MARY 51
likelihood of identifying perpetrators and would also serve to deter assaults and violence at the
Sadler Center.
Cyber attack. A cyber attack could be carried out by a campus member or an
unaffiliated party. The attack could be launched from within Sadler Center, at another location
on campus, or from outside of the College. A member of the college community could
inadvertently assist in the corruption of the network through poor end user actions. Examples
include clicking on an infected link in an email, responding to a phishing scam, or using a USB
drive that has been loaded with malware. The Sadler Center uses the College’s network to
regulate meal plan use at the dining hall, to complete business transactions at the Student
Xchange and fast food stores, and to plan and host meetings and presentations. Damage to the
network would temporarily suspend these activities. Since payments are made at the businesses
within the Sadler Center, a cyber attack could cause sensitive personal financial data to be
exposed.
The existing countermeasures include an information technology disaster recovery plan
and the use of a network vulnerability manager, which tracks and handles cyber threats
(Visionael Corporation, 2004; William and Mary, 2015). The mass notification messaging
system is used to warn the campus community of significant cyber threats (William & Mary,
2015a). Also guests are limited to twenty-four hours of access to the unsecured wireless network,
which is distinct from the main network secured through credential log-in. In the event of a
significant network issue in the Sadler Center, the building coordinator would work with the
Emergency Management Team to address the situation (William & Mary, 2015a). The Sadler
Center is well-protected against cyber attack from a system standpoint. It remains most
vulnerable from end user risk. Faculty, staff, and students, should be educated on the risk their
RISK ASSESSMENT WILLIAM AND MARY 52
individual actions can have on the network. The campus community that uses the network should
complete training that promotes best cyber security practices.
Crime. Due to its open access and extended hours, the Sadler Center is a potential target
for crime, such as vandalism, theft, or trespassing. A successful attack could result in minor
damages to the structure or loss of equipment and furnishings contained in the building. Since
the Sadler Center provides services to organizations outside of the College, it does not have any
screening to determine who can and cannot enter the building. The only general area that is not
immediately accessible is the dining hall. Staff stationed at the dining hall entrance permit those
who pay or who have a meal plan to enter. Outside of meal times, this area is locked. Campus
security patrols the area surrounding the Sadler Center and occasionally goes inside the building.
Their presence is increased during the evening hours. Security personnel scan each of the rooms
at closing time and request any remaining individuals to leave. Overnight, the Sadler Center is
closed and its entrances are locked. Community members who witness suspicious or criminal
activity can follow instructions provided in the In Case of Crisis mobile application or contact
the police with the Rave guardian mobile application if they feel threatened in the situation
(William & Mary, 2015b).
Security patrol could be reviewed to ensure randomness in their routes. Security
personnel could also enter the building more frequently during their patrol rather than focusing
on the perimeter. External lighting is dim surrounding the Sadler Center, and some entrances are
obscured by shadows at night. Figure 20 depicts the east side of the building where shadows are
cast both day and night, and external lighting is lacking. Increasing the lighting around the
outside of the building, especially near entrances, could deter break-ins and vandalism. The
RISK ASSESSMENT WILLIAM AND MARY 53
addition of cameras internally and externally would also serve to deter crime at the Sadler
Center. Cameras would allow for potential identification of criminals if an incident does occur.
Figure 20. Shadow cast over east door to the building with no cameras and limited lighting.
Surry Nuclear Power Plant radiation release. Since the Sadler Center does not store
hazardous materials like the science buildings do, a chemical, biological, radiological, nuclear,
and explosives (CBRNE) incident specific to this building is unlikely unless there is a major
event involving the Surry Nuclear Power Plant. If there was a radiation release, the effects could
be devastating to the Sadler Center structure and its occupants. Contamination of both the
building and the people could occur. If significant enough, the building could become unusable.
The health effects experienced by occupants could be extensive and long-term in a severe
incident. The siren system, the mass notification messaging system, and a call center would be
used in a radiation release (William & Mary, 2015a). The warning siren from the Surry Nuclear
RISK ASSESSMENT WILLIAM AND MARY 54
Power Plant is also audible in the Sadler Center. If the Emergency Management Team orders the
campus to shelter-in-place, the building coordinator would lead the execution of this plan in the
Sadler Center (William & Mary, 2015a). If an evacuation is necessary, students can use the
evacuation plans they are required to confirm annually.
Similar to a severe weather incident, students may be unlikely to use their reported
evacuation plans in a radiation release. Students should be required to write their evacuation plan
each year rather than confirm it. The plans for severe weather, a radiation release, and other
events requiring evacuation would use the same plan. Therefore, this countermeasure would be
beneficial for addressing multiple threats. The recommend countermeasure of a formal web
application for evacuation could also be applied to this situation. The College should coordinate
drills and exercises with the Surry Nuclear Power Plant, and occupants in the Sadler Center
should participate.
Abduction. While members of William and Mary have not been abducted in the past,
community members of other colleges have been kidnapped. In 2014, the abduction of Hannah
Graham, a student at the University of Virginia gained international attention after she
disappeared and was found murdered. This event allegedly involved a person unaffiliated with
the university. A similar event could occur at William and Mary. The prior assaults on the terrace
by people not associated with the College indicate that outsiders are willingly to commit violent
crimes in this area. An abduction could result in casualties on an individual scale. If an abduction
took place in the vicinity of the Sadler Center, the community may feel that the area is unsafe in
the future.
Current countermeasures include security patrol that incorporates the Sadler Center in its
route. Community members can keep the Rave Guardian mobile application open when they are
RISK ASSESSMENT WILLIAM AND MARY 55
walking on campus to immediately notify police of their location if they are in danger. App users
can also set a timer that will send an alert if the person does not make it to their destination
within a specified time period. The College offers multiple options for those who feel unsafe
walking at night. Community members can request a police escort or call one of the student-
operated resources. Alpha Phi Omega, a service fraternity, provides a service called Campus
Escort, through which students can request a golf cart ride or walking escort to any location on
campus (Alpha Phi Omega, n.d.). According to Alpha Phi Omega (n.d.), this service is offered
daily from 9 p.m. to 1 a.m. during the week and 9 p.m. to 2a.m. on the weekend. Steer Clear is an
organization that hires student drivers to transport other students around campus and in the
immediate area off campus on Thursday through Saturday nights (Steer Clear, n.d.). The phone
numbers to contact both services are located on William and Mary’s ID cards. In the event of an
abduction, social media and a call center would be utilized.
Safe student transportation services can be used by those traveling to or from the Sadler
Center. Specific to the building and the surrounding area, increased lighting and installation of
cameras would serve to deter crime. Camera footage was pivotal in the Hannah Graham case and
having video recordings of the Sadler Center area could provide clues if an abduction occurs
there.
Flood. A flood could occur due to the presence of wetlands throughout the campus and
from rain. A flood could cause structural damages to the Sadler Center, injuries to people, and
closure of the facilities and stores on Level 1. The Sadler Center is adjacent to some of the
wetland areas, but is uphill of them. The Sadler Center’s positioning reduces the likelihood that a
flood will impact the majority of the building. In case of a significant flood, the siren system and
mass notification messaging system would be used, and the building coordinator would be
RISK ASSESSMENT WILLIAM AND MARY 56
involved in response to issues at the Sadler Center (William & Mary, 2015a). Most of the
building is designed so that water will run off and away from the structure. However, there is an
area outside of Level 1 on the south side that is located at the bottom of an incline. Shown in
Figure 21, this area is covered with cement and does not have adequate drainage. An appropriate
drain system should be installed to prevent water from pooling outside of the emergency exit and
from flooding Level 1.
Figure 21. Area outside of Level 1 requiring drainage improvement.
Asset-Based Security Vulnerability Analysis. A security vulnerability analysis (SVA)
allows for assessment of the Sadler Center’s vulnerabilities, threats, existing countermeasures,
and present risk (Bennett, 2007, p. 266). Using Bennett’s (2007) guidelines, an asset-based SVA
was produced in Table 5. This type of SVA evaluates the elements of a key asset and determines
how the vulnerabilities might put the asset at risk to various threats (Bennett, 2007, p. 267).
Existing countermeasures are listed, and recommended countermeasures are proposed (Bennett,
2007, p. 267). Bennett (2007) suggests that the threats should be assessed for their likelihood and
level of impact in order to determine which security countermeasures are appropriate to
RISK ASSESSMENT WILLIAM AND MARY 57
implement (p. 267). After the existing countermeasures are examined for effectiveness, the
countermeasure recommendations are prioritized based on which would reduce the most risk
(Bennett, 2007, p. 268). Table 5 depicts an asset-based SVA specific to the Sadler Center.
Problem Risk Existing Countermeasures Recommendations Priority
Fire Structural damage,
casualties
Pull alarms, warning lights, smoke detectors,
sprinklers, fire extinguishers, lit exit signs,
visibly marked FDC, approval required for
candle use at events, In Case of Crisis app, Rave Guardian app, building coordinator, call center
Create clear signs indicating location of fire extinguishers, promote drills with Williamsburg
Fire Department, update directory maps for
accuracy, clearly display building evacuation route maps, install exit signs in west hallways on Levels 2
and 3
3
Active shooter Casualties
Siren system, mass notification messaging
system, In Case of Crisis app, Rave Guardian app,
shelter-in-place plan, social media, CAIT, building
coordinator, call center
Hold response drills and exercises, educate
community on CAIT basic response tenets
3
Severe weather
Structural damage,
casualties, loss of utilities
Siren system, mass notification messaging
system, required student evacuation plan, unofficial transportation and shelter offers, In Case of Crisis app,
social media, building coordinator, call center,
back-up generators
Compel community members to rewrite
evacuation plans each year rather than just
resubmit, create formal transportation and shelter
application
3
Explosive Structural damage,
casualties
Siren system, mass notification messaging
system, In Case of Crisis app, Rave Guardian app, building coordinator, call
center
Reinforce structure to withstand explosive,
employ random vehicle checks at loading dock, encourage post office employees to review
warning signs and procedures for suspicious
packages
2
RISK ASSESSMENT WILLIAM AND MARY 58
Assault/violence Structural damage,
casualties
Security patrol, student events must be registered
with the Student Leadership Development office, option for student organization sponsored
event to request security (required for some), In Case of Crisis app, Rave Guardian
app, can request police escort at night, CAIT,
building coordinator, call center
Increase security presence at rallies, encourage student use of Rave Guardian app and
reporting to CAIT, install internal and external
cameras
2
Cyber attack
Network failure,
exposure of sensitive
information
Network vulnerability manager, information
technology disaster recovery plan, mass
notification messaging system, guests limited to 24
hours of access to unsecured wireless
network, secured network with log-in, building
coordinator
Education on end user risk 2
Crime
Building vandalism, equipment
theft
Security patrol, building closed overnight, In Case of Crisis app, Rave Guardian
app
Increase external lighting, review patrols for
randomness, install internal and external
cameras
1
Surry Nuclear Power Plant
radiation release
Structural contamination,
casualties
Siren system, mass notification messaging
system, In Case of Crisis app, required evacuation
plan, shelter-in-place plan, building coordinator, call
center
Compel community members to rewrite
evacuation plans each year rather than just
resubmit, create formal transportation and shelter
application, coordinate drills and exercises with
Surry Nuclear Power Plant
1
Abduction Casualties
Security patrol, Rave Guardian app, can request
police escort at night, social media, call center, Steer
Clear, Campus Escort
Add internal and external security cameras, increase
external lighting 1
Flood Structural damage,
casualties
Siren system, mass notification messaging
system, structure built on elevated ground, building
coordinator
Add drainage to cement area outside of Level 1 on
south side of building 1
RISK ASSESSMENT WILLIAM AND MARY 59
Table 5. Asset-based security vulnerability assessment of the Sadler Center.
Evaluating Risk
After the SVA is conducted, each potential problem must be assessed to determine if the
existing countermeasures adequately reduce the presented risk or if changes are necessary
(Bennett, 2007, p. 268). In Table 5, the chart is organized based on the countermeasures that will
reduce the most risk (Priority = 3) to those that will reduce the least risk (Priority = 1).
Countermeasures can reduce risk by addressing vulnerabilities or by lessening the impact if an
incident were to occur (Bennett, 2007, p. 268). It is also necessary to perform a cost-benefit
analysis to evaluate whether the benefit of the countermeasures is valuable enough to justify the
cost of their implementation (Bennett, 2007, p. 292).
High Priorities. The highest priorities for implementing security countermeasures are for
fire, active shooter, or severe weather situations. The Sadler Center is likely to experience a fire
and the impact in structural damage and casualties could be high. Current countermeasures are
appropriate but ineffective if they are not apparent to users. The cost of implementing clear and
accurate signage would not be expensive and would require minimal maintenance. Drills with
the Williamsburg Fire Department already occur throughout campus, so it should not be
challenging to ensure that they continue to include the Sadler Center. The improvements in signs
could contribute to a significant amount of people escaping safely from the meeting rooms in the
west hallway if they are made aware of the nearest exit.
An active shooter event has a relatively low likelihood of occurrence but the potential for
substantial casualties. The existing countermeasures provide resources before and during an
active shooter event, but their impact is limited by lack of awareness. Educating the campus
community and holding drills and exercises would be a low-cost method to reducing
RISK ASSESSMENT WILLIAM AND MARY 60
consequences. People who are knowledgeable about the type of actions they should take prior to
an event are more likely to select the best approach when in that situation. This could result in
less casualties.
Severe weather threatens the campus throughout the year and is the most likely type of
incident. The impact of severe storm systems could be significant. The existing notification and
evacuation plans are appropriate but could be made more efficient if students have more realistic
and structured planning tools. Requiring students to resubmit their evacuation plans would have
a small time cost but would establish accurate and considered preparation. A web application to
match students for transportation and shelter purposes would have some cost associated with
development, testing, and implementation, but could prevent students from being stranded.
These recommendations could reduce the delay in evacuation and thereby lower consequences
from casualties.
Medium Priorities. Implementing countermeasures for an explosive, an assault/violence,
and a cyber attack are medium priorities. An explosive is a low probability, high impact
situation. At the Sadler Center, structural damage and casualties could be extensive. The existing
countermeasures provide information and a notification in the event of a bomb threat or
suspicious package. Both recommended countermeasures of random vehicle checks at the
loading dock and Post Office employees’ review of instructions for handling suspicious packages
would offer some reduction in risk by lessening vulnerabilities. Increased checks and heightened
employee situation awareness increases the probability of the explosive detection and may also
deter adversaries who observe security. Vehicle checks would require extending security
personnel’s hours, hiring additional employees, or redirecting attention from other tasks. There
would be some cost associated with all three options, but infrequent checks would not be
RISK ASSESSMENT WILLIAM AND MARY 61
expensive. Education of Post Office employees would have limited cost, while another
recommended countermeasure, the reinforcement of the Sadler Center to withstand an explosion,
would be very expensive. The benefits of reinforcement could reduce casualties, but the
associated cost is too high at this time.
An assault/violence has a medium probability of occurrence and would have a moderate
impact on the structure and people. The existing countermeasures adequately identify at-risk
situations for assault and violence but could be improved with increased security. Once events
are determined to be at a heightened probability for violence, security personnel should make an
effort to have increased personnel in the area. This could incur some cost by redirecting security
personnel from their regular duties, but their presence at events might deter violence and
decrease casualties if it does occur. The cost of installing cameras would include the purchase,
maintenance, and staffing to monitor them. If budget constraints prevent the full implementation
of these measures, the cameras could be installed without consistent monitoring. They would still
act as a deterrent and provide evidence of crimes committed within their field of vision.
A cyber attack represents a high likelihood event with a moderate impact. A successful
attack could cause network failure at the Sadler Center and could result in the theft of sensitive
personal financial data. The campus has effective countermeasures in place to combat cyber
attacks on the system, but educating the campus community on end user risk would be
inexpensive and promote greater security. Reducing unsafe individual actions would limit
vulnerabilities in the network and lower the risk for a cyber attack.
Low Priorities. Based on the analysis of the SVA, countermeasures for crime, Surry
Nuclear Power Plant radiation release, abduction, and flood are the lowest priorities. Crime,
including vandalism, theft, and trespassing are likely to occur but have a minor impact. These
RISK ASSESSMENT WILLIAM AND MARY 62
criminal acts could result in minimal structural damages and property loss. While existing
countermeasures provide security, additional countermeasures could increase it. Increased
external lighting and installation of cameras are also a proposed countermeasure for assault and
violence. If these countermeasures are implemented to lower the risk for assault and violence,
then the risk will also be reduced for other crimes.
A Surry Nuclear Power Plant radiation release has a low probability of occurrence but
would have a high impact through building and occupant contamination. The existing
countermeasures provide consequence reduction through notification and evacuation plans. The
recommended countermeasures to improve evacuation planning for severe weather would also
lessen the risk for radiation release. Coordinated drills and exercises with the Surry Nuclear
Power Plant would provide an opportunity to test response efforts, but the level of planning
required would be substantial. As a result, only infrequent collaborations would be warranted.
An abduction has a moderately low likelihood of occurrence with low levels of expected
impact. Unlike the consequences of an active shooter or an explosive, the casualties of an
abduction would probably be measured on smaller scale. The existing countermeasures provide
extensive resources for safe transportation at night, which reduces vulnerabilities. Security patrol
is already present, but external lighting and cameras could be added to improve security further
at the Sadler Center. As referenced for the assault/violence and crime situations, these
countermeasures would lessen the potential consequences and risk for multiple scenarios.
A flood has a fairly high level of probability and a moderate level of impact. Structural
damages would occur to the Sadler Center and some casualties could be expected. Sadler’s
location uphill and general design to promote run-off reduces the buildings vulnerability to
flooding. Adding appropriate drainage on the south side of Level 1 would reduce vulnerability
RISK ASSESSMENT WILLIAM AND MARY 63
further but not substantially. The cost would be dependent on the amount of labor necessary to
install a drain system in that area. This countermeasure would be beneficial to implement, but its
limited level of risk reduction and potential cost make it a low priority.
Conclusion
The risk assessment conducted for the Sadler Center has evaluated the key assets,
determined the vulnerabilities, identified the threats and their probability and potential impact,
considered the effectiveness of existing countermeasures, made recommendations for
improvement, and analyzed the overall risk and priority associated with implementing these
changes. Determined through the use of a risk screening, the Sadler Center’s key assets are its
structure, people, utilities, and network. Threats to the Sadler Center include fire, active shooter,
severe weather, an explosive, an assault/violence, a cyber attack, crime, Surry Nuclear Power
Plant radiation release, abduction, and flood. The existing countermeasures are appropriate and
reduce vulnerabilities and consequences to lower the overall risk of each threat.
Recommendations to limit risk further have been discussed and prioritized. Depending on
budgetary allocations, these additional countermeasures can be implemented. The highest
priorities include installing accurate signage, coordinating drills and exercises, promoting
education and awareness of existing resources, and developing more engaging evacuation
planning tools. On a continual basis and after any countermeasures are implemented, the Sadler
Center should be re-evaluated for risk.
References
Alpha Phi Omega. (n.d.). Campus escort. Retrieved from
http://wmpeople.wm.edu/site/page/alphaphiomega/campusescort
RISK ASSESSMENT WILLIAM AND MARY 64
Bennett, B. T. (2007). Understanding, assessing, and responding to terrorism: Protecting
critical infrastructure and personnel. Hoboken, NJ: John Wiley & Sons, Inc.
Bing. (2015). Bing maps. Retrieved from https://www.bing.com/maps/
Bush, G.W. (2001, Oct 16). Executive Order 13231 of October 16, 2001: Critical infrastructure
protection in the information age. Retrieved from
https://www.dhs.gov/xlibrary/assets/executive-order-13231-dated-2001-10-16-initial.pdf
City of Williamsburg. (2015). Web logistics for Williamsburg. Retrieved from
http://williamsburg.timmons.com/flex/index.html
College of William & Mary. (2015a). William & Mary. Retrieved from http://www.wm.edu/
College of William & Mary. (2015b, Aug 19). Emergency Response Guide. In In Case of Crisis
(Version 3.5.1) [Mobile application software]. Retrieved from
https://www.wm.edu/about/administration/emergency/preparedness/safety_apps/crisis_ap
p/index.php
College of William & Mary Emergency Management Team. (2010, Mar 1). College of William
and Mary building emergency plan: McGlothlin-Street Hall. Retrieved from
https://www.wm.edu/as/computerscience/documents/Building%20Emergency%20Plan-
McG-Street%20Hall-FINAL.pdf
Department of Homeland Security. (2003, Dec 17). Homeland Security Presidential Directive 7:
Critical infrastructure identification, prioritization, and protection. Retrieved from
http://www.dhs.gov/homeland-security-presidential-directive-7
Department of Homeland Security. (2013). NIPP 2013: Partnering for critical infrastructure
security and resilience. Retrieved from
RISK ASSESSMENT WILLIAM AND MARY 65
http://www.dhs.gov/sites/default/files/publications/National-Infrastructure-Protection-
Plan-2013-508.pdf
Department of Homeland Security. (2015a, Sep 9). National Infrastructure Protection Plan.
Retrieved from http://www.dhs.gov/national-infrastructure-protection-plan
Department of Homeland Security. (2015b, Oct 27). Regional Resiliency Assessment Program.
Retrieved from http://www.dhs.gov/regional-resiliency-assessment-program
Esri. (n.d.). How GIS works. Retrieved from http://www.esri.com/what-is-gis/howgisworks
Federal Emergency Management Agency. (2015a, Apr 24). FEMA 433 – Using Hazus-MH for
risk assessment. Retrieved from http://www.fema.gov/fema-433-using-hazus-mh-risk-
assessment
Federal Emergency Management Agency. (2015b, Nov 12). Hazus. Retrieved from
http://www.fema.gov/hazu
The Flat Hat. (2009a, Apr 14). Four students assaulted near Sadler Center. The Flat Hat.
Retrieved from http://flathatnews.com/2009/04/14/70730/
The Flat Hat. (2009b, Apr 24). City showing signs of gang-related activity. The Flat Hat.
Retrieved from http://flathatnews.com/2009/04/24/city-showing-signs-gang-related-
activity/
Map Developers. (2015). Google map distance calculator. Retrieved from
http://www.mapdevelopers.com/distance_finder.php
Steer Clear. (n.d.). Steer Clear. Retrieved from
http://wmpeople.wm.edu/site/page/steerclear/home
U.S. Fish & Wildlife Service. (2015, May 28). Wetlands mapper. Retrieved from
http://www.fws.gov/wetlands/Data/Mapper.html
RISK ASSESSMENT WILLIAM AND MARY 66
The White House. (2013, Feb 12). Presidential Policy Directive-Critical Infrastructure Security
and Resilience. Retrieved from https://www.whitehouse.gov/the-press-
office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil