STEALTH AND DECEPTION – SPEED AND VIOLENCE: How the New Threat Affects Physical Protection Systems.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Risk Management Introduction Risk Management Fundamentals
WMD Crime Scene Management
1 Protecting the Long Island Business Community A Public Safety Partnership.
Protecting the Public, Astronauts and Pilots, the NASA Workforce, and High-Value Equipment and Property Mission Success Starts With Safety “September 11th.
An active shooter event involves one or more persons engaged in killing or attempting to kill multiple people in an area occupied by multiple unrelated.
THE FOLLOWING MINI PRESENTATION ON OPSEC IS TAKEN FROM A US AIR FORCE BRIEFING. ALTHOUGH THIS IS A MILITARY PRESENTATION, IT PROVIDES A GOOD OVERVIEW OF.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
DEVELOPING REALISTIC DIRTY BOMB EXERCISES Dirty bombs were a problem long before , the Iraqi government tested a one-ton radiological bomb. The.
UNIT PHYSICAL SECURITY PLAN
Active Shooter Response
Threat/Vulnerability Assessments for Foods FDA Science Board Advisory Committee Meeting November 6, 2003 Robert E. Brackett, Ph.D. Director, Food Safety.
EDS Public Information Tabletop Exercise
Physical Security John Schwertfeger Security Manager Duane Arnold Energy Center.
Visual 1.1. Visual 1.2 What is CERT? The Community Emergency Response Team (CERT) program helps train people to be better prepared to respond to emergency.
The Need for an Integrated View of Water Quality Modeling and Monitoring Bruce Kiselica USEPA, Region 2 Second Workshop on Advanced Technologies in Real.
Auditing A Risk-Based Approach To Conducting A Quality Audit
1 SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of.
EMPLOY THE RISK MANAGEMENT PROCESS DURING JOB PLANNING and EXECUTION
School Safety Staff / Students / Visitors
Location Aware Music Player By Kevin West David Zhao.
How to Respond. Sgt. Trent Smith Bremen District #24.
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
Introduction to Network Defense
Technician Module 2 Unit 3 Slide 1 MODULE 2 UNIT 3 Self Protection, Rescue, Decontamination & Medical.
Commander’s Intent & Guidance
National Response Team Presentation: “Security Risk Assessment Methodologies: Community VAM 3/3/3 Presented By: Gloria E Chavez Sandia National Laboratories.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
AICT5 – eProject Project Planning for ICT. Process Centre receives Scenario Group Work Scenario on website in October Assessment Window Individual Work.
A Secure Frontline September 25, 2003
Chapter 12 Examining Response to Violent Incidents 12-1.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Implementing and Conducting a School Threat Assessment United States Secret Service & U.S. Department of Education Presented by Eric Gettes School Psychologist.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
Confined Space Rescue Most confined space fatalities are poorly trained rescuers…
PAR CONFERENCE Homeland Defense A Provider’s Perspective Lessons from TMI Dennis Felty November 15, 2001.
A Major Business Disruption A Strategy for Minimising the Downtime Anthony Hegarty Mitigating Risks.
World Trade Center in Retrospect  Hind Sight is 20/20  Security Challenges  A Look At the Facility  Reconsider Risk  Critical Infrastructure  Keep.
Air Operations Branch Director Course Safety Part 2 Risk Management U.S. AIR FORCE AUXILIARY U.S. AIR FORCE AUXILIARY.
Port Security Safeguarding ISPS Drills & Exercises Workshop
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
Indicators of Terrorist Activity Handbook US Coast Guard Headquarters Port Security Evaluation Division (CG-3PCP-4)
1 Appendix B Initial Briefing Template. 2 Site X Vulnerability Assessment (VA) Presenter name Presenter organization Presenter phone Presenter phone/ .
23 July 2003 PM-ITTS TSMOTSMO Information Assessment Test Tool (IATT) for IO/IW Briefing by: Darrell L Quarles Program Director U.S. Army Threat Systems.
ISSUES OF NATIONAL SECURITY ARE NO LONGER SIMPLE!
TEFMA 2008 Sudhish Nayyar. AGENDA CRISIS –What is the worst thing that could happen? –Where? –When? Steps in effective Crisis Management Aon’s capabilities.
By CPT Robert L. Crabtree
Principles of Security
AB209 Small Business Management Unit 3 – Planning the Business and its Products or Services.
Measures of Effectiveness and End-State Criteria Center of Excellence in Disaster Management and Humanitarian Assistance.
September 11, Events leading up to 9/11- 1 st WTC bombing in ‘93.
Collaboration Process 1. IC Objectives and Risk Tolerances Define, document, and implement top-down internal control objectives and risk tolerances: 
10. Security and Physical Protection Basic Concepts
INMM Nuclear Security and Physical Protection Technical Division.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
2  Containment and negotiation, normally associated with standoff incidents may not be useful  Often better armed than initial responding officers 
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
Joint Force Headquarters-Michigan CCIRs and PIRs
Joint Force Headquarters-Michigan CCIRs and PIRs
Federal Protective Service
Peacekeeping and Stability Operations Institute The Army’s only organization for Peace and Stability Operations at the strategic and operational level.
Operations Security (OPSEC)
Prevention, Intelligence
APK Bellwork Think* Pair* Share
Industrial Irradiator
FACILITY TARGET HARDENING
Presentation transcript:

STEALTH AND DECEPTION – SPEED AND VIOLENCE: How the New Threat Affects Physical Protection Systems

Brian Sanford, President, GDI Tim Ryan, Assistant Director of Operations, GDI

This briefing is: UNCLASSIFIED

Thesis High-risk facilities should re-evaluate their Physical Protection Systems (PPS) based on terrorists’ current Method of Operation.

Current Method of Operation (MO) Stealth and Deception Position Terrorists and Assets for attack At Detection, or time of the their choosing, strategy shifts Speed and Violence Multiple, synchronized Improvised Explosive Devices (IEDs) Detonated at self-lethal range

Old Physical Protection Systems Designed prior to realistic terrorist threat on American soil Focused on deterrence of vandalism, theft

New Physical Protection System Developed by Sandia National Laboratories Well-established methodology used to protect nuclear assets Concepts are not “new”, but application to non-nuclear, high-risk facilities is a current trend

Assumptions Challenged Application of Sandia model must consider new threat By using Stealth and Deception, Detection/Assessment may not occur at the perimeter By using Speed and Violence in a suicidal manner, time available to defeat an attack is significantly reduced

PPS Functions Review Detection (useless without assessment) Perimeter and entry control most common Delay (multiple, serial barriers) provide time for response force to arrive and interrupt the adversary Response – clear communication essential Must have capability to interrupt adversary prior to mission accomplishment

Adversary StartAdversary Finish PPS Time Required DetectionResponse Delay AlarmAlarm AssessedInterruption Graph 1 Adversary Time Required

PPS Characteristics Review Balanced Protection Equal time and difficulty along all possible paths Protection –In – Depth multiple obstacles that must be defeated in sequence Redundancy mitigates the danger of individual component degradation

Design Basis Threat (DBT) The DBT is the worst potential adversary or scenario that a facility’s PPS is created to defeat Nuclear facilities have used the following DBT The DBT is considered to include an attack using stealth and deception initially, then a determined, violent assault by several persons who may be well trained, have inside assistance, weapons, tools, vehicles, and the ability to operate as two or more teams

“Containment” vs. “Denial” Suicidal terrorists do not need to escape to succeed This reduces the time available to intervene “Containment” strategy previously used Adversary could “get-in”, but response force would arrive before they could “get-out” “Denial” strategy more appropriate Terrorists must be interrupted prior to reaching critical node.

Even Less Time Available Using Stealth and Deception, detection may not occur at the perimeter Adversary time spent before detection does not “count”. Highlights the importance of Delay and Response U.S.S. Cole attack

“Swipe-card” Example Expands a secure perimeter to each cardholder’s purse, vehicle, or home. To defeat a secure perimeter at a hardened facility, terrorist need only break in to an employee’s car He may enter undetected, and have a considerable “head-start” on the response force once he is detected

Critical Detection Point (CDP) The CDP is any position on a facility where if an adversary is detected, there is enough time remaining for the response force to interrupt the adversary

Critical Detection Point: STEALTH AND DECEPTIONSPEED AND VIOLENCE Adversary Minimizes DetectionAdversary Minimizes Delay Adversary begins taskAdversary completes task Minimum delay along terrorists’ path just exceeds the response force’s time to interrupt Minimum Time Delay Left Response Time Left to Interrupt Graph 2 `

CDP Failings Many facilities do not know where their CDP is If they do know, they assume that detection will occur at the perimeter Many perimeters are built on property lines, without regard to their CDP. In many cases, the CDP might already be OUTSIDE of the perimeter

Speed and Violence Adversary may completely disregard stealth and still accomplish his mission. Beyond the Critical Detection Point at the beginning of the attack Demonstrated just last month in Riyadh, Saudi Arabia. Terrorists shot armed guards, and took less than one minute to detonate three IEDs at Western housing complexes

Response Force Limitations Response force may not be adequate, or have adequate information to stop violent adversaries Columbine example Officers on scene in minutes. Took over one hour AFTER adversaries’ suicides for officers to enter building First responders cautious due to unknown threat

Response Force Limitations (cont) Response force caution can be expected So many first responders died on September 11 th when the World Trade Center Towers collapsed Potential threat of Nuclear, Biological, or Chemical (NBC) contaminants in a future terrorist attack Undue caution minimized with clear, concise, and consistent communications Practice the communication and security plan with the response force and local law enforcement

Conclusions “Bombings are responsible for approximately 70 percent of the historical occurrences of terrorist activity.” Deterrence is no longer sufficient The absence of an attack does not validate a facility’s current Physical Protection System High-Risk facilities must seek expertise on PPS design

Conclusions (continued) Delay is too often neglected CDP must be determined Practice drills with law enforcement and medical responders and simulated “terrorists” must be conducted and evaluated regularly Follow through with lessons learned. Facilities must adjust their CDP and PPS accordingly

Summary Terrorists are not afraid of dying, they are afraid of failing They will develop plans that have the greatest impact and probability of success By employing tactics of Stealth and Deception, detection may not occur at the perimeter.

Summary (continued) By employing tactics of Speed and Violence, security may be evacuating instead of responding High-risk facilities must re-evaluate their Physical Protection Systems in light of sound PPS design criteria, current intelligence, and adversary methods.

Questions?