Innovative and Unconventional Concepts

Slides:



Advertisements
Similar presentations
Criminal Justice Response of Intimate Partner Violence and Visible Minorities May 8, 2008 Workshop on Vulnerabilities and Criminal Justice Processing of.
Advertisements

WMD Crime Scene Management
Factors that effect trafficking outcomes and vulnerability
A hazard in itself is not a disaster.. It has the potential to become one when it happens to populations who have certain vulnerabilities and insufficient.
US&R Planning. US&R Planning Issues Establish authority and responsibility Assess vulnerability and hazards Identify resources Coordination of response.
Psychology of Terrorism Kirk Kennedy, Ph.D. Chief, Center for National Security Psychology Behavioral Sciences Directorate DoD/Counterintelligence Field.
The Culture of Death: Terrorist Organizations and Suicide Bombing Ami Pedahzur National Security Studies Center University of Haifa Harrington Fellow Department.
AIRPORT AND TERMINAL SECURITY
A Guide to Raising Resilient Children 1. 2 Is There a Need?  3 rd leading cause of death in adolescence  2 nd leading cause of death in college students.
1 Module 2: Promoting Compliance with Environmental Law.
Hate Homicides Higgins O’Brien Spring FBI Definition: “Criminal offenses committed against persons, property, or society that are motivated, in.
Incident Command System Basic Course
Copyright © 2013 by Mosby, an imprint of Elsevier Inc. Importance of Health Assessment DSN Kevin Dobi, MS, APRN.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Management, 6e Schermerhorn Prepared by Cheryl Wyrick California State Polytechnic University Pomona John Wiley & Sons, Inc.
System Analysis System Analysis - Mr. Ahmad Al-Ghoul System Analysis and Design.
DED 101 Educational Psychology, Guidance And Counseling
Chapter One: The Science of Psychology
Chapter 2: The External Environment: Opportunities, Threats, Industry Competition and Competitor Analysis Overview: The firm’s external environment.
Detective Barry Smith Oakdale Police Department.
New Applied Research Project concerning Sexual Abuse of Persons with Disabilities An Assessment of the Social, Cultural and Institutional Factors that.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
22 “Experiences and Priorities of War Affected Female Youth in Africa” Dr. Dyan Mazurana Feinstein International Center Fletcher School of Law and Diplomacy.
CITIZEN CORPS & CERT ORGANIZATIONS. What is Citizen Corps? Following the tragic events that occurred on September 11, 2001, state and local government.
Implementing and Conducting a School Threat Assessment United States Secret Service & U.S. Department of Education Presented by Eric Gettes School Psychologist.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Copyright © 2013 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 2 Health Promotion and Disease Prevention.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Chapter One: The Science of Psychology. Ways to Acquire Knowledge Tenacity Tenacity Refers to the continued presentation of a particular bit of information.
9 Terrorism as Organized Crime.
IAFS 1000 Terrorism. Dinner See evite Paper Presentations Dec min. talk, 6 min. Q&A Clearly and concisely summarize: –Argument –Evidence (analysis.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Capability Cliff Notes Series PHEP Capability 5—Fatality Management What Is It And How Will We Measure It? For sound, click on the megaphone and then.
George W. Bush Foreign Policy War on Terror. 9/11 September 11, al-Qaeda terrorists. Four passenger airliners. Two succesful suicide attacks.
WORKPLACE VIOLENCE CARROLL WARD EASTERN REGIONAL SECURITY OFFICER FAX:
Forensic Victimology 2nd Edition Chapter Thirteen: School Shootings.
IAFS 1000 Terrorism.
Community Planning 101 Disability Preparedness Summit Nebraska Volunteer Service Commission Laurie Barger Sutter November 5, 2007.
Chapter Thirteen – Organizational Effectiveness.  Be able to define organizational effectiveness  Understand the issues underpinning measuring organizational.
FBI Method of Profiling Violent Serial Offenders
Viol_oh5/02/00 1 Building A Safe Workplace: Preventing Workplace Violence Employee Training Cooperatively Developed By and The Commonwealth of Pennsylvania.
Screening as an Intervention to Address Intimate Partner Violence Presented by Anita Kellogg, Enesha Hicks, Kyle M. Yanchura, & Jenn Hudson.
The Psychologist as Detective, 4e by Smith/Davis © 2007 Pearson Education Chapter One: The Science of Psychology.
September 11 th Attacks By: Jacob Wall.
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
Warm-up: PSA - VideoVideo What should a person do if he or she is contemplating suicide because of bullying or other forms of abuse ? © 2016 NorthsideISD.
 Approximately 75,000 defendants are implicated by eyewitnesses in the U.S. every year, but unfortunately, some eyewitnesses make mistakes.
Chapter 17: Foreign Policy and National Defense Section 2.
QUESTIONNAIRE: TRUE OR FALSE?. 1. PEOPLE WHO TALK ABOUT SUICIDE DO NOT ACTUALLY KILL THEMSELVES. False Most people who die by suicide talk with at least.
 To increase the awareness of young people around the process of radicalisation of individuals.  To enable young people to identify and discuss factors/indicators.
Self Aid / Buddy Aid This Program is the results of advances in Military Medicine on the Battlefields of Iraq and Afghanistan. All Branches of US Military.
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
Center of Excellence PEACE OPERATIONS COMMAND & CONTROL AND COMMAND & CONTROL AND TRANSITION ISSUES Lt Col (R) John Derick Osman Center of Excellence in.
A Community Approach to Suicide Prevention Presented By: Karen M Marshall.
Application of Criminological Theory to Terrorism Prevention Detective Eric Paull Planning Research and Development Akron, OH Police Department.
Global Acts of Terror. Terrorism Defined Terrorism is the use of violence and threats to intimidate and coerce (force action) for political reasons. Terrorism.
FINANCIAL INCLUSION AND SHARED PROSPERITY: THE NEXT FRONTIER Michael Morris Executive Director National Disability Institute June 2, 2016.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Chapter 16 Terrorism and National Security.
Disaster and Emergency Management
Non-Compliance Behaviors General Overview of Physical Restraint Requirements for Public Education Programs Prepared by the Massachusetts Department of.
Joint Force Headquarters-Michigan CCIRs and PIRs
Criminal Psychology & Psychological Profiling
Joint Force Headquarters-Michigan CCIRs and PIRs
Preparing for a Terrorist Attack Indian Point Energy Center
Training at the Awareness Level Review
Prevention, Intelligence
FACILITY TARGET HARDENING
Presentation transcript:

Innovative and Unconventional Concepts Potential Warning Signs and Indicators Associated with Preparation for and Execution of a Suicide Attack 23 April 2003 Michael J. Hopmeier Chief, Innovative and Unconventional Concepts Unconventional Concepts, Inc. 425 E. Hollywood Blvd, Suite A Mary Esther, FL 32569 (850) 243-4411, Fax (850) 243-5279 hopmeier@gnt.net Presentation © 2003 Unconventional Concepts Inc.

The Device— Man and Machine

Who Has the Bomb Suicide bomber Dhanu, with a sandlewood garland, minutes before attacking former Indian Prime Minister Rajiv Gandhi. She is wearing an explosive device beneath her dress, intended to kill her and her target.

Suicide Bombings

Suicide Bombings (cont’d) 11 Killed

Homicide Bomber Victim 19 May 2002, Netanya, Israel Spinal Cord Bystander in market area of attack Initially presents with small puncture wounds Antipersonnel characteristics of belt bombs 18 nails in upper torso and head 30+ in lower extremities Trauma X-Ray - Hillel Yaffe Medical Center

Suicide Bombers: What Do We Do about Them? Mohamed Atta and Abdul Aziz Al-Omari passing through security at Portland Airport in Maine on September 11, 2001 (source: FBI)

U.S. Department of Defense

Suicide Bombing Suicide attacks/bombings are those attacks where not only does the attacker anticipate dying, but actively participates in the process of his/her own death The difference between a gunman who expects to be killed versus a bomber who actually kills himself

Who Is a Suicide Bomber? Male or female Young or old Any nationality With or without a family Political or apolitical Muslim, Jewish, White Anglo-Saxon Protestant, Buddhist

Ballistic Missiles: A Useful Analogy Most effort is focused on the terminal portion of flight, or cleaning up after impact Best approach is to prevent manufacture, or launch, of the missile Courtesy USAF Air War College

Ballistic Missile Analogy Suicide bombers are like the missile, carrying the warhead We should focus on how to prevent their manufacture (recruitment, training) as well as the launch (preparation, movement to scene) But, like a missile, even if we take out the launch capability, the ones in flight are still a hazard It may take a generation after we remove the incentive/motivation to really have an effect

Signature of Missiles Like missiles, the bombers, their “warhead” and manufacturing sites, launch sites, etc., have signatures We need to identify those signatures, and then determine the best method for neutralization Signatures occur at all phases of the process, not just at impact

“Signature” That array of information, signals, and distinguishable characteristics that falls into a repeatable pattern that can then be used to identify a specific “target.”

What Is a Suicide Bomber?

General Characteristics of Suicide Bombing A central element in a terror organization’s campaign of psychological warfare Both primitive and sophisticated aspects Primary goal is to terrify a larger group of people than those immediately present at the explosion Motives: Acting in the name of God, a nationality, a leader, or the organization Peer pressure Revenge Deterrence Money Paradise

General Characteristics of Suicide Bombing (cont’d) Preparation may involve more than one person Both men and women may take part Suicide terror activities take place over a wide geographical area There is no single profile of a suicide terrorist— however, there ARE general characteristics.

How To Apply Signatures Understand the suicide bomber’s process Map the process to identify and catalog potential signatures Generate specific technologies and techniques to help identify signatures Interdict or prevent the suicide attack

Four Areas of Focus Prevention How do you keep the bombing from happening? Detection Who is the suicide bomber? Neutralization What can I do about it after detection but before detonation? Response What do you do about the aftermath of the explosion? The result is a management problem that must address the connection between these four areas of focus.

Creating a Signature—Present Based on empirical observation Lacks the ability to predict unanticipated results or changes in operations Requires existing data Like incidents must have occurred already Preventing a suicide bombing is the key!

Creating a Signature—Future Combine the empirical approach with predictions What is the bomber’s planning process? How will the attack be carried out? Implement a stepwise procedure: Define the process required to plan, prepare for, and implement a suicide attack Derive the anticipated signature from this process

Assumptions Suicide bombers will be unfamiliar with U.S. culture They will need to seek advice and assistance They may, however, have some familiarity with U.S. culture as they might have lived here for a few years The suicide bomber is terminated in the attack Few experienced bombers are available to train others Planning and preparation must be kept secret Bombers will be able to trust few people to assist them in the U.S. Bombers will have to develop a cover story They will attempt to enlist petty criminals to help acquire materials and hide operations

Assumptions (cont’d) But... Criminals can be a source of information for the authorities! According to the DEA, 90 percent of information on potential terrorist threats comes from local law enforcement, not the intelligence agencies!

The Attack Process and Opportunities for Detection Like a missile in flight, each aspect of the process has a unique signature The difficulty is in identifying that signature, and drawing the correct conclusion

The Suicide Attack Process Formulate the goals/intent Choose the target Prepare for the mission Manufacture the bomb Deploy to the final staging area Move into position Activate the device

The Suicide Attack Process (cont’d)

The Suicide Attack Process (cont’d) Formulate the goals/intent Mass casualities Economic damage Publicity Political statement Opportunity to interdict:  Recognize the goals/intent via planning signatures

The Suicide Attack Process (cont’d) Choose the target Choice will maximize the intended outcome Choice will minimize the risk of intervention and required resources Opportunity to interdict: Harden desirable targets Makes them less accessible Forces bombers to lesser targets or to expend more effort, or deters them

The Suicide Attack Process (cont’d) Prepare for the mission Includes training, indoctrination and recruiting Usually requires an organization with strong religious and/or political beliefs Opportunity to interdict: Likely nonprofessional, non-American perpetrators will make cultural and/or criminal mistakes Alert law enforcement can identify and investigate

The Suicide Attack Process (cont’d) Manufacture the bomb Collect components Assemble the device Opportunity to interdict: Detect chemical signatures, suspicious purchases, movement of required materials

The Suicide Attack Process (cont’d) Deploy to the final staging area Check out the device Work out final details Minimize potential for failure/discovery Opportunity to interdict: Transport of explosives and people Behavioral cues Clues from law enforcement/intelligence

The Suicide Attack Process (cont’d) Move into position Position the bomber and the device at the target Opportunity to interdict: Transport of explosives and people Behavioral cues Clues from law enforcement/intelligence

The Suicide Attack Process (cont’d) Activate the device “Warhead” detonation Opportunity to interdict: Behavioral cues Trancelike state Inappropriate clothing Avoiding direct contact with others

Assumptions Suicide bombers will be unfamiliar with U.S. culture They will need to seek advice and assistance They may, however, have some familiarity with U.S. culture as they might have lived here for a few years The suicide bomber is terminated in the attack Few experienced bombers are available to train others Planning and preparation must be kept secret Bombers will be able to trust few people to assist them in the U.S. Bombers will have to develop a cover story They will attempt to enlist petty criminals to help acquire materials and hide operations

Outlook for the Future Recruitment of the disaffected in the U.S. will be key to terror organizations, á la Cold War espionage The U.S. has no indigenous population comparable to the Palestinians in Israel Recruiter signature could become that of sociologist/psychologist who focuses on those vulnerable to manipulation and influence

And Finally, Prevention is the goal—and the most difficult Need early knowledge, identification, and interdiction of attacks Must identify when, where, and how a suicide bombing might occur, and who might perpetrate it

We need to develop a comprehensive understanding of the motivations, goals, and intents of terrorists who use suicide attacks. We can then create effective models of the process, derive the relevant signatures, and stop the attack.