Threat Analysis

Holistic Shelter Design begins with a proper threat assessment and analysis. Ranking threats based on probability and impact drives facility design aspects including site, access and concealment.


Protection

The Shelter must resist all defined design threats; a weak link in any aspect of protection may compromise the shelter.


Event, Aftermath, Long Term

After threat events are defined, and the shelter designed to resist those threats, surviving the duration after the event becomes a critical piece of planning.

Example: threat defined as HEMP (High Altitude Electromagnetic Pulse) Event that causes loss of grid electricity. Protection may include HEMP shielded or resistant water/food/heat/power generation/communications. After the event, threats may include large portions of population seeking food/water/power/shelter/security/etc. Shelter design must include protection against the event, and provide for security after the event. Food security, reliable access to water (storage tanks, internal well), electrical power generation (fuel tanks, HEMP shielded generators, etc.), and concealment. This last item may be the most important after the event, people will be desperate to attain what you have stored and protected.

Long Term one should consider how to survive after stored food is used:

  • Gardens with non-GMO crops that one can harvest seeds from and store

  • animals that are hardy, heritage breeds

Summary: a holistic survival plan requires a thorough assessment of the event, how to survive the effects, and planning for after the event. In some cases locations allow all this on-site, in other cases some threats may be possible to mitigate at one’s primary residence while long term survival provisions are set up remote, away from high population densities. Castle Shelter Group leverages decades of experience working with Government and Military Protective Facilities to assess threats and design a covert, holistic solution for prepared persons to survive a catastrophic event. Contact us for a secure conversation.