ANTITERRORISM Terrorism has become a media event and, as such, a phenomenon of our time. Terrorist frequently claim affiliation with what types of causes?

Slides:



Advertisements
Similar presentations
1 Maritime Law Enforcement. 2 INTRODUCTION Naval Forces as economic & effective law enforcement units Risk of Excessive Use of Force Avoided by –law enforcement.
Advertisements

Airport Emergency Plan - Overview
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
Copyright © Allyn & Bacon 2010 Global Social Problems: War and Terrorism This multimedia product and its contents are protected under copyright law. The.
Chapter 13 Crimes Against the State Joel Samaha, 9th Ed.
MCIEAST-MCB CAMP LEJEUNE REGIONAL EMERGENCY MANAGEMENT
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
Civilian Intelligence Organizations
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Business Crisis and Continuity Management (BCCM) Class Session
USE OF FORCE IN INTERNATIONAL LAW
Chapter Eleven Political Crime and Terrorism. Political Crime Since 9/11 political crime and terrorism have become important areas of criminological inquiry.
1 James Johnson September 15, 2004 University of Phoenix On-Line EDTC 560 Applications of Multimedia and Web Page Design Instructor: Eli Collins-Brown.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
The Federal Bureaucracy Chapter 15. What is a bureaucracy?
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
BSAF-BIONET Meeting Robert J. Hashimoto, CBSP University of California, Berkeley October 2, 2009.
9 Terrorism as Organized Crime.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Citizenship Issues C.I.4 U.S. Domestic and Foreign Policy Students are able to: 4.2 Describe U.S. foreign policy. Students may indicate this by: – Defining.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Institute for Security Studies Institute for Security Studies Submission on the Anti-Terrorism Bill Some Comments and Suggested Approaches.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Unit 2 Human Rights Part 3 Civil and Human Rights.
Changes Provoked by the 9/11 Attack  Various changes in the U.S. legislation  Exceptional number of adopted policies  Change of Americans’ perceptions.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Foreign & Defense Policies. Discussion Questions:  Why do you think the Founders intentionally divided responsibility for foreign affairs between president.
ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
Navy Doctrine for ATFP NWP HM1 (SW/AW) Alburg.
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP
Welcome to class. I. Law Enforcement=the people and the agencies responsible for making sure that Americans are following the rules and not breaking.
Objectives SWBAT Identify the various procedures in the enactment, implementation, and enforcement of law SWBAT compare responsibilities, jurisdictions,
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
US Army TRADOC TRISA TSP 159-T-0001 A Military Guide to Terrorism in the Twenty-First Century (Version 5.0) 1 Training Support Package 159-T March.
ACCESSION TO COUNTER- TERRORISM CONVENTIONS PORTFOLIO COMMITTEE FOR SAFETY AND SECURITY
Week 4 Seminar Investigating Significant Injuries and Lessons Learned.
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
Chapter 17: Foreign Policy and National Defense Section 2.
Objective 4.7 The Cabinet. Objective 4.7 how do cabinet departments and federal agencies, help to carry out the laws?
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
Civil Unrest Emergency Responder Forum. Definitions  Civil Unrest – civil strife.
Civil Aviation Security Program The FBI’s Counterterrorism Division’s (CTD) Civil Aviation Security Program (CASP) is responsible for Criminal and Terrorism.
CJ in the USA Copyright 2011 Curriculum Technology, LLC. All Rights Reserved.
Foreign policy is the conduct of one nation towards another nation Domestic policy is the government’s actions within the borders of its own country.
DHS/ODP OVERVIEW The Department of Homeland Security (DHS), Office for Domestic Preparedness (ODP) implements programs designed to enhance the preparedness.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Pre-Event Planning Unit 2. Visual 2.1 Unit 2 Overview This unit describes:  When communities should begin planning for a special event.  The concept.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter 16 Terrorism and National Security.
Federal District Courts
Current Event Brief!.
MODULE 2 UNIT 4 Working at the Scene Allow 30 minutes for this section.
Joint Force Headquarters-Michigan CCIRs and PIRs
Joint Force Headquarters-Michigan CCIRs and PIRs
Introduction to OSHA (Part 1)
Federal Protective Service
The Executive Branch.
Foreign Policy and National Defense
Electronic Surveillance, Post 9/11
Chapter 17: Foreign Policy and National Defense Section 2
Foreign Policy and National Defense
Criminal Investigations
MODULE 2 UNIT 4 Working at the Scene Allow 30 minutes for this section.
Presentation transcript:

ANTITERRORISM Terrorism has become a media event and, as such, a phenomenon of our time. Terrorist frequently claim affiliation with what types of causes? Political organizations to give claim respectability.

TACTICS Tactics vary according to the levels of training the terrorist have. Categories of training are: Trained: Entire group with formal training Semi-trained: Few have been trained and passed the training on to others Untrained: No members have training

TACTICS Name some objectives the terrorist might hope to accomplish? Attract publicity for cause Demonstrate their power Show governments lack of power Extract revenge Obtain logistic supports Cause government to overreact

TACTICS COMMON TACTICS INCLUDE: Assassination: Killing prominent person or symbolic enemies. Arson: Less dramatic, low risk, low level of knowledge needed. Bombing: Improvised explosive device (IED) is the terrorist weapon of choice.

TACTICS Hostage Taking: Usually overt seizure, with intent of gaining publicity. Very risky Kidnapping:Usually covert seizure of one or more persons to extract demands. Requires elaborate planning and logistics. Hijacking: Could be employed as means of success. Normally carried out to produce a spectacular hostage situation.

TACTICS Seizure: Involves buildings or objects that have value in eyes of the audience. Risk due to security forces. Raids or attacks: Usually done for three reasons: to gain access to broadcasting, demonstrate government ’ s inability to secure facility, or to require resources.

TACTICS Sabotage:Done to demonstrate how vulnerable society is to terrorist actions. Hoaxes: any terrorist group that establishes credibility can employ a hoax with success. Special Weapons: Potential for mass destruction and deep-seated fear most have of chemical/biological weapons are used to make a statement

TACTICSW Environmental Destruction: Increasing accessibility of sophisticated weapons to terrorist have the potential to threaten the environment. Technology: Can interrupt transportation, banking, public health, ect. Computer attacks are on the rise. Availability of powerful explosives give terrorist more capabilities.

TERRORIST CAPABILITIES What technologies have enhanced terrorist capabilities? Communications, encryption capabilities, surveillance equipment, weapons, range of computer and information, weapons components, and the Internet.

TERRORIST CAPABILITIES Antiterrorism capabilities have also been enhanced: Detection of explosions, detection of and defense against C-B agents, physical protection, incident response, data analysis and dissemination.

Categories of terrorist groups are: National, transnational, and international. National operate within single nation. Transnational operate across borders. International operate in two or more nations

CATEGORIES Terrorist are also known in this manner: Non-State-Supported-operate autonomously, receiving no significant support from any government. State Supported: Receives support from one or more governments. State-directed: Agents of the government

TERRORIST ORGANIZATION Security is the primary consideration for terrorist. Groups are usually cellular, each cell isolated. Larger groups have central command and control elements. Smaller groups may have single command element. Militarily structured

TERRORIST Terrorist organizations have little or no access to government resources and need support. Structure is: Leadership: hardcore, totally committed Active Cadre: those who :carry out attacks Active Support: Don ’ t commit violent acts but provide money. Passive Supporter: Sympathetic to cause

TERRORIST Not all committed to ideology. Crusaders: ideologically inspired Criminals or professionals: Work for personal gain Emotionally or mentally disturbed: Commit acts for special mandate from a deity.

TERRORIST TARGETS Terrorist seems to thrive in the environment that offers the least justification for political violence. The reasons US interest are a target is ideological differences. Terrorist think the U.S. will dictate courses of action to other governments. Our presence around the world is a factor.

Domestic Terrorism At the time this was written, the statement was made that “ Despite recent bombings in New York, Oklahoma, and Atlanta, the U.S. has a low rate of terrorism ”. We now know that has changed. Terrorism is now a major issue in the United States.

LEGAL CONSIDERATIONS U. S, Policy: All terrorist actions are criminal and intolerable. All lawful measures to prevent such acts and to bring justice to those that commit them will be taken No concessions to terrorist extortion will be made When Americans are abducted overseas the host nation will exercise its responsibility under international law.

LEGAL CONSIDERATIONS Close contact will remain with host governments International cooperation remains a fundamental aspect of U.S. policy.

LEAD AGENCY Lead Agencies for terrorist acts are: Department of State: Outside the U.S. Department of Justice/FBI: Inside the U.S. Department of Transportation: Aboard Aircraft in flight. U.S. Coast Guard: Antiterrorism in US Ports

LEGAL ASPECTS By definition terrorist acts are criminal acts. Captured terrorist are not afforded protection as per Prisoner of War Status. In peacetime: punishable under domestic law In war: Tried under local criminal law and military jurisdiction by courts-martial or military tribunal

COMMANDERS AUTHORITY Legal and policy restrictions are contained in the Posse Comitatus Act or other federal statutes. President is currently empowered to use military forces for what purposes? To restore and maintain public order Respond to request for aid Protect constitutional rights Protect Federal property

PRESIDENTIAL AUTHORITY CONT Meet specified contingencies Assist US Secret Service in protecting the President Assist Federal magistrates Assist Attorney General Assist EPA

PRESIDENTIAL AUTHORITY To cope with domestic emergencies and protect public safety. Institute emergency rule when required JURISDICTIONS: Look not only to substance of offense but to where it occurs.

JURISDICTION Name the four categories of Federal Territorial Jurisdiction: Exclusive: Federal government has all authority over issue Concurrent: Federal government and State have same authority over issue Partial: Federal and State each exercise “ some ” authority

JURISDICTION Proprietarily Jurisdiction: Federal government has acquired interest in but no legislative jurisdiction over it. Items to remember: Federal law contains no special prohibition against terrorist acts as do some state codes. In some cases, terrorist acts may be violations of state laws. Choice between Federal or state action is made by prosecuting authority.

Federal Agencies National Security Council: Formulates policies Committee to Combat Terrorism: Focuses on protection of foreign diplomatic personnel in the U.S. as well as those working abroad. Department of Justice: responsible for overseeing Federal response to acts of terrorism.

FEDERAL AGENCIES FBI: Primary operational agency for the management of terrorist incidents. DOD: Has the lead role in countering domestic terrorist incidents where US forces may be used. Military Authority: With Presidential approval to use military force.

USE OF FORCE What is the Hierarchy for Use of Force? Presidential Approval, then Attorney General, then FBI or Secretary of Defense. Then Special Agent in Charge (FBI) or Military Commander (SOD) and then can work jointly together to complete mission.

Military Installations Installation commanders are responsible for maintain law and order on military installations. Military provides initial response. Foreign Incidents: Same as domestic just report to host nation and Department Of State. Response to off-installation incidents is SOLE responsibility of host nation

INTELLIGENCE What is the first line of defense in the AT Program. Primary Sources of INTEL are: Open-source information, criminal records, government intelligence, and local information.

SOURCES OF INTEL Open Source Information: Publicly available Criminal Records: Military and civil law enforcement agencies collect criminal records Government Intel: Responsible for coordinating the national intel agencies concerned with combating terrorism Local Information: Valuable source

RESPONSIBILITIES Who is responsible for collecting and processing domestic terrorist Information in the U.S.? FBI Who Overseas? CIA

THREATS We must have a continual process of compiling and examining all avail information to identify threats against the U.S. Threat analysis factors are: Factor 1: Existence Factor 2: Capability Factor 3: Intent Factor 4: History Factor 5: Targeting Factor 6: Security Environment

THREAT LEVEL CRITICAL: Factors 1, 2, 5 present. 3, 4 may be. HIGH: Factors 1, 2, 3, 4 are present MEDIUM: Factors 1, 2, 4 present LOW: Factors 1,2 present NEGLIGIBLE: Factors 1,2 may or may not be present.