Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Security

Similar presentations


Presentation on theme: "Introduction to Security"— Presentation transcript:

1 Introduction to Security
Chapter 13 Terrorism and Homeland Security Responsibilities

2 Security Professionals Responsibilities and Homeland Security
Knowing the enemy, who to look for and be vigilant Taking all possible steps to prevent a terrorist attack Preparing themselves and their agencies for an attack Responding to an attack Investigating the attack

3 Terrorism Defined According to the Terrorism Research Center:
“the use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives”

4 A Brief Chronology of Terrorism
: French Revolution revolutionaries used violence against enemies 1930s – Terrorist acts used by Hitler, Mussolini and Stalin Late 1880s – 1990s – KKK 1978 – 1995 – Unabomber Late 1980s – Animal Liberation Front

5 3 Elements of Terrorism Criminal in Nature
Targets are typically symbolic Terrorist actions are always aggressive and often violent

6 A Brief Chronology of Terrorism
1995 – Alfred P. Murrah Federal Building bombed by Timothy McVeigh & Terry Nichols 1998 – 2 U.S. embassies in East Africa bombed 10/12/2000 – USS Cole attacked in Yemen 9/11/2001 – World Trade Center and Pentagon attacked by terrorists using hijacked airliners

7 Who does what? FBI – the lead agency for responding to acts of domestic terrorism Federal Emergency Management Agency (FEMA) – the lead agency for consequence management after an attack

8 USA PATRIOT Act Singed into law by President Bush on October 26, 2001
Gives police the unprecedented ability to seize, search, detain or eavesdrop in their pursuit of terrorists Expands the FBI’s wiretapping and electronic surveillance authority Establishes new punishments for possessing biological weapons

9 Asymmetric War A war in which a much weaker opponent takes on a stronger opponent by refusing to confront the stronger opponent head on The weaker opponent chooses battles where the stronger one does not expect to be hit. Police and government agencies are the most common targets.

10 World Wide Terrorist Targets

11 Classification of Terrorist Acts
Domestic Terrorism International Terrorism

12 Classification of Terrorist Acts
Domestic Terrorism Based in this country White supremacists Black supremacists Militia groups Pro-life groups Animal rights activists Environmental extremists

13 Classification of Terrorist Acts
International Terrorism Foreign based – 3 categories Foreign state sponsored (Iraq, Libya) Formalized terrorist groups (al Qaeda, Hamas) Loosely affiliated radical extremists – least organized, but largely unknown, leaving them free to travel

14 Indicators of Terrorism
Following is a lengthy list of possible indicators of possible terrorists It is important to note that these are only possible indicators and do not constitute proof in and of themselves. They apply to both foreign and domestic terrorists.

15 Indicators of Terrorism
Possession of fake/altered IDs Multiple identification in different names Possession of IDs with dramatically different photos of the same person anti-American, anti-Jewish, or anti- “anything” material Residence in several states in the last few years

16 Indicators of Terrorism
Taken multiple trips out of the country or out of state in the last few years Possession of videos/photos of public places and/or buildings Taken flying lessons Extreme interest in martial arts Repeated use of public Internet access points to avoid tracing

17 Indicators of Terrorism
Possession of phone cards Possession of large amounts of cash Renting first floor apartments (easy escape) Using inexpensive motels (less security) Don’t allow maids to clean the room when they are not present

18 Indicators of Terrorism
No apparent means of legitimate income Display of racial/terrorist symbols Recent shaving of head and body hair

19 Methods Used by Terrorists
Arson Explosives Bombs Suspicious packages Suicide bombers Weapons of Mass Destruction Biological agents Chemical agents Nuclear Technology

20 Likeliness of Methods Used by Terrorists

21 Impact of Terrorist Weapons

22 Preventing Terrorism Security officers should stay alert for routine crimes/activities which may also be terrorism red flags Watch for thefts/sales of certain chemicals: bleach, riot control sprays, chlorine, ammonium nitrate, etc.

23 Preventing Terrorism National Infrastructure Protection Plan (NIPP)
Provides a collaborative, coordinated approach between the private sector and all facets of government Includes agriculture and food, banking and finance, chemical, communications, dams, drinking water and water treatment, energy and other critical areas.

24 Goals of the Department of Homeland Security
Increase our ability to keep bad people out of the country Keep bad things out of the country Protect our infrastructure better Continue to build a response capability with modern computer tools Promote Intelligence Gathering Fusion centers

25 Fusion Centers 42 fusion centers are located throughout the country in 37 states. These manage the flow of information and intelligence across all levels and sectors of government and private industry.

26 Responding to Terrorist Attacks
First responders, most likely local police, firefighters and security officers are the first line of defense against terrorists. These first responders must have interoperability in order to operate effectively.

27 Concerns related to the War on Terrorism
Civil liberties may be jeopardized People of Middle Eastern descent may be discriminated against or become victims of hate crimes.


Download ppt "Introduction to Security"

Similar presentations


Ads by Google