Hostile and Pre-Operational Surveillance Mike Moll Protective Security Advisor, DHS.

Slides:



Advertisements
Similar presentations
Enhanced Critical Infrastructure Protection (ECIP) Facility Dashboard November 2009.
Advertisements

Department of Homeland Security Site Assistance Visit (SAV)
Bentley Water and Wastewater 2004 Edition. Rule-based annotation Cell placement with annotation Bulk assignment of attribute to like elements Automatic.
Data Quality Considerations
Human Aspects of System Design Introduction –Designing the human element into a system is paramount to its success –One error incorporated by the human.
Chapter 3 Graphic Methods for Describing Data. 2 Basic Terms  A frequency distribution for categorical data is a table that displays the possible categories.
OIRA / IT November 2014 Instructor Course Evaluation (ICE) Students’ Manual.
1 The critical challenge facing banks and regulators under Basel II: improving risk management through implementation of Pillar 2 Simon Topping Hong Kong.
In-depth look at ISACS Stockpile Management: Weapons Photo: MAG.
National Infrastructure Protection Plan
The Office of Infrastructure Protection
Conversation on the Chemical Facility Anti-Terrorism Standards (CFATS) and Critical Infrastructure Protection Chemical-Terrorism Vulnerability Information.
Fiscal Year 2008 Urban Areas Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
By: Ashwin Vignesh Madhu
Safety Audit Components Safety assessment for risk Management.
Conclusions & Recommendations
MASH Understanding Multi-Agency Safeguarding Hubs 1.
US Army Corps of Engineers BUILDING STRONG ® Consequence Assessment for Dam Failure Simulations Kurt Buchanan, CFM Economist Mapping, Modeling, and Consequences.
Strengthening General Aviation Security November 2011.
1 © 2008 Brooks/Cole, a division of Thomson Learning, Inc. Chapter 1 The Role of Statistics & The Data Analysis Process.
S/W Project Management
TITLEIIA(3) IMPROVING TEACHER QUALITY COMPETITIVE GRANTS PROGRAM 1.
Prevention-Mitigation Fiscal Year 2010 Initial Grantee Meeting December 8 – 9, 2010, Santa Monica, California Arthur Cummins Director Safe and Healthy.
Transitioning to the COSO 2013 Update.  Released on May 14, 2013  Designed to build upon the foundation of the 1992 Framework  Will supersede the 1992.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
Urban Design Goals: Produce a high quality living environment for all residents. Clarify and enhance the relationship between new housing development and.
Student Engagement Survey Results and Analysis June 2011.
Chapter 1: Research Methods
Diana Hillier November 2009 Materiality: Planning & performing the audit Evaluating misstatements ISAs (UK and Ireland) 320 and 450.
1 Quality Center 10.0 NOTE: Uninstall the current version of QC before downloading QC All QC 10.0 documents can be located on the BI Shared Services.
Chapter 1 The Role of Statistics. Three Reasons to Study Statistics 1.Being an informed “Information Consumer” Extract information from charts and graphs.
Management & Development of Complex Projects Course Code MS Project Management Perform Qualitative Risk Analysis Lecture # 25.
National Commission for Academic Accreditation & Assessment Developmental Reviews at King Saud University and King Faisal University.
Indicators of Terrorist Activity Handbook US Coast Guard Headquarters Port Security Evaluation Division (CG-3PCP-4)
1 Copyright © 2005 Brooks/Cole, a division of Thomson Learning, Inc. Chapter 1 The Role of Statistics This is officially the most boring PowerPoint presentation.
Early Childhood Outcomes Indicator 7 Data Collection Application Review.
PMC Update on Cyber Sprint June 18, Overview: 30-Day Cyber Sprint 1.Interagency Cyber Sprint Team: Launched June 11 and executing against the.
Infrastructure Update Jennifer Kawatu Kim Watson Andee Krasner
PRIVACY BY DESIGN FOR PUBLIC / PRIVATE PARTNERSHIPS FOR SECURITY EU FP7 TACTICS CCR Summit 2015, September 30t h 2015.
Chapter 7 Measuring of data Reliability of measuring instruments The reliability* of instrument is the consistency with which it measures the target attribute.
Engineering | Architecture | Design-Build | Surveying | Planning | GeoSpatial Solutions November 16, 2015 THE AWWA J100 - WHAT IT IS, WHY IT IS BEING UPDATED,
SMART SCHOOLS BOND ACT Michelle Okal-Frink (716) Contact Michelle or your CSR for more information.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
Prepare + Prevent + Respond + Recover + Mitigate Preparedness Section Planning Branch 1.
The Michigan Primary Care Transformation (MiPCT) Project MiPCT Update PO Webinar May 20 th, 2015.
Quality assurance and graduate student support Fred L Hall Former Dean of Graduate Studies at University of Calgary, McMaster University,
 The introduction of the new assessment framework in line with the new curriculum now that levels have gone.  Help parents understand how their children.
POLK RAIL QUIET ZONE ANALYSIS Conditions Assessment CSX “S” Line March 24, 2016.
CounterMeasures™ Risk Analysis and Management May 2005.
CDM Construction Design and Management
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
CET4884 Dr. Nabeel Yousef.  Dr. Nabeel Yousef  Located at the ATC campus room 107Q  Phone number 
Headquarters U.S. Air Force
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
Conclusions & Recommendations
Chapter 3: Cost Estimation Techniques
Section 1.4: Types of Data and Some Simple Graphical Displays
Interdisciplinary teams Existing or new roadway
Compliance with hardening standards
The Role of Statistics & The Data Analysis Process
Critical Infrastructure Protection Policy Priorities
Instructor Course Evaluation (ICE)
PowerSchool for Parents
CMS HIPAA Transaction Implementation Status Checklist
Safety Audit Components
Securing the Chemical Sector:
Gender Based Security For SHIs
Integrating Gender M&E Capacity Strengthening Workshop, Addis Ababa
Unit 14 Emergency Planning IS 235
Presentation transcript:

Hostile and Pre-Operational Surveillance Mike Moll Protective Security Advisor, DHS

Do Terrorist Cells exist in the U.S.? --Yes? --No?? Maybe??

Real World Examples --Middle-Eastern individual asking “suspicious questions” at a large chemical facility --White Male and Female engage in Suspicious Surveillance photography/videotaping of large chemical facility --Two middle-eastern males taking pictures at a school bus garage --Three middle-eastern males walk into a hospital in Michigan and ask, “Where are the children kept?” and “Where are the Muslims?” --Three middle-eastern males driving up to a nuclear plant at a high rate of speed, doing a “Chinese Fire-Drill”, yelling “Allah Akbar” and leaving at a high rate of speed….

How do you mitigate Terrorism? --Can you??? --Yes --Financially --Understand CIKR Vulnerability --Raise the vigilance level of the American Public --Teach timely and accurate reporting --Focus on training at the pre-primary levels and continue on through to the High School years

Enhanced Critical Infrastructure Protection (ECIP) Facility Dashboard November 2009

Infrastructure Survey Tool (IST) Development Began in June 2008  Pilot (Summer 2008)  Version 1 (Fall 2008)  Version 2 (Summer 2009) Web-based Tool Collects Data  Streamlines data collection  Oracle back end database  Supports analysis and Dashboard Major Principles  Simply a survey of existing protective measures in place at the facility  Gathers data at the weakest point for any particular protective measure (e.g., the shortest part of the fence or the one gate with the single lock) 6  Resulting Protective Measures Index (PMI) is calculated using the relative importance assigned to each protective measure attribute by a team of subject matter experts

Protective Measures Index (PMI) - Review Based on Six “Level 1 Components” 1.Physical Security 2.Security Management 3.Security Force 4.Information Sharing 5.Protective Measures Assessment 6.Dependencies  Each of these components is based on “Level 2 Components”  Level 2 Components are, in turn, based on the most detailed asset characteristics, which are “Level 3 Components” for the facility (at the weakest point) 7

8 IST Level 1 and Level 2 Components

 Fences  Gates  Closed circuit television (CCTV)  Intrusion detection systems (IDS)  Parking  Access control  Security lighting  Vehicle access control  Building envelope For Example, There Are 9 Physical Security Level 2 Components: 9

Level 3 Components Affect Vulnerability (Fences Example) Fence Protective Measures Index = f (fraction enclosed, type, height, base anchored, other fence characteristics) FPMI = f (z 1, z 2,..., z n ) = b i * z i n Σ i = 1  FPMI is a protective measures index of fence security going from 0 (less secure) to 100 (more secure), the z i represent specific levels of achievement for the factors that increase fence security (e.g., height, type, characteristics), and the b i are scaling constants (weights) that specify the relative importance of the factors. (Note: the equation may take on a different form) 10 Additional information can be found at Constructing Vulnerability and Protective Measures Indices for the Enhanced Critical Infrastructure Protection Program by R.E. Fisher, W.A. Buehring, et al., October 1, 2009.

 7-foot aluminum chain-link fence  Anchored base  Outriggers, 45 degree  Barbed wire  Clear zone, free of objects Fence Protective Measures Index = 60 Fences PMI Example  Wood fence  6-foot height  Partial clear zone Fence Protective Measures Index = 13 11

Comparing Facility and Subsector Facility PMI 12 Subsector MaximumSubsector AverageSubsector Minimum Overall Facility PMI

Dashboard – Overall Tab “Overall” tab shows the overall facility PMI and the PMIs for each major component (Level 1) of the facility PMI (blue bar) and the low, average, and high PMI for the subsector (dots). Touch on the bar or dots to see the exact PMI figures. 13

Dashboard – Component Screens Level 2 Components Level 3 Data Level 3 Component PMI Overall PMI Bar Level 1 PMI Bar Level 2 PMI Dial Tabs – Level 1 14

Dashboard Interpretation  The Dashboard is a way to display facility-specific information obtained through the ECIP  Shows the PMI calculations for each component of the IST  PMI has a constructive sense in that it increases (gets better) as protective measures are added The Dashboard shows the difference between the individual facility’s specific PMI and the average PMI for other like facilities (usually the critical infrastructure subsector) The product should not give the impression that the subsector average PMIs are indicative of desired or adequate performance 15

Dashboard Interpretation (cont’d) The Dashboard draws attention to components that are well below or well above the subsector average and may deserve additional study. There may be very good reasons why a facility has a component PMI that is below subsector average.  Example: An urban facility where parking is allowed on the street would result in a low standoff number; no additional facility action may be possible  May just note the vulnerability and consider other protective measures enhancements (e.g., additional CCTV along the facility street-side to identify suspicious vehicles) Each facility is different and will mitigate vulnerabilities and implement protective measures based on an individualized assessment of risks taking into consideration threat, assets to be protected, and facility characteristics. 16

Dashboard is a Tool The Dashboard is simply a tool, and the PMI is simply a reflection of existing protective measures at the facility, not a definitive determination of facility vulnerability. DHS is not advocating that any particular protective measures be installed/utilized at a facility based solely on the relative impact to the facility’s PMI reflected in the scenario element of the Dashboard. It is recognized that not all protective measures are appropriate at every facility. Therefore, simply raising the PMI for a section in the Dashboard is not necessarily directly correlated to a reduction in vulnerability for a particular facility unless it is an appropriate measure that is properly integrated with the facility’s current security posture and effectively implemented. 17

How Do You Receive an IST? --Based on CIKR Thresholds --Contact Me to Arrange --Takes at least 4 to 6 hours --Need Security Director, IT, Facilities at a minimum --Facility owner/operator will get a look prior to submission --All information is protected from FOIA/Sunshine, etc…

QUESTIONS?

Mike Moll Protective Security Advisor Work Cell