Threat into Risk: A Challenge for Security Guidance AusRAIL 2006 Tony Beard Office of Transport Security Department of Transport and Regional Services.

Slides:



Advertisements
Similar presentations
Child Protection Units
Advertisements

Tips and Resources IASC Cluster/Sector Leadership Training
1 Title Goes Here Canadas Maritime Security Threats and Responses.
Department of Homeland Security Site Assistance Visit (SAV)
1 Protecting the Long Island Business Community A Public Safety Partnership.
HR Manager – HR Business Partners Role Description
Administration, Management, and Coordination of Supportive Housing: Guidelines from CSH’s Dimensions of Quality MHSA TA Operations Call September 1, 2010.
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
1 Continuity Planning for transportation agencies.
DHS, National Cyber Security Division Overview
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
The Australian/New Zealand Standard on Risk Management
Community Planning & Capacity Building Recovery Support Function Presented By: Michelle Diamond Community Planning & Capacity Building Coordinator FEMA.
Welcome to The Expert Community Forum 19 November 2007.
UK Office for Security & Counter Terrorism Future threats and the potential role of the CBRN Action plan in supporting the BTWC Dr Catherine Terry International.
Benefits for using a standardised risk management framework to risk assess Infection Prevention and Control Sue Greig Senior Project Officer National.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
ACSIF Air Cargo Security Industry Forum. ACSIF Member Organisations.
TERRORISM / POLITICAL VIOLENCE SOLUTIONS FAIR International Insurance Conference on "Political Violence" April 2010 – Karachi Daniel O’Connell
COBIT® 5 for Risk Introduction
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Strengthening General Aviation Security November 2011.
© Grant Thornton UK LLP. All rights reserved. Review of Partnership Working Vale of Glamorgan Council Final Report- July 2008.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Risk Management, Culture & Governance. Agenda  What is risk management?  A framework for risk management  Establishing a good risk culture  Getting.
A Major Business Disruption A Strategy for Minimising the Downtime Anthony Hegarty Mitigating Risks.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
PREVENTION & RESPONSE “ARE YOU PREPARED” Security & Emergency Management Conference 1 June 2006 FA Frank Prendergast National Manager Counter Terrorism.
Needs Assessment: Young People’s Drug and Alcohol Services in Edinburgh City EADP Children, Young People and Families Network Event 7 th March 2012 Joanne.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Early Help Strategy Achieving better outcomes for children, young people and families, by developing family resilience and intervening early when help.
Hazards and Disaster Management
Risk Management For the Board of The Law Society 16 February 2005.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
© College of Policing Limited 2012 Version 1.0 NOT PROTECTIVELY MARKED 26/10/2015 Stage Two Assess Threat and Risk Gold Public Order Commander 4.4.
Getting it Right for Every Learner in Renfrewshire: A Partnership Approach for Additional Support Needs (Draft Revised Renfrewshire ASL Act Implementation.
Prevent Information and Overview Updated October 2013, Education Office.
Identifying Systemic Issues and Improving Customer Service Annette Donselaar ASM BA BCom MComLaw LLM DFP Grad Dip Compliance AACI Head of Australian Region.
Nuclear Security Culture William Tobey Workshop on Strengthening the Culture of Nuclear Safety and Security, Sao Paulo, Brazil August 25-26, 2014.
Preparing for Winter 2011/12 Guidance Overview Stuart Low Planning Manager Scottish Govt NHSScotland Business & Performance Mgt Team.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
Environment and Disaster Planning Hari Srinivas, GDRC Rajib Shaw, Kyoto University Contents of the presentation: -What is the problem? -Precautionary Principles.
TEFMA 2008 Sudhish Nayyar. AGENDA CRISIS –What is the worst thing that could happen? –Where? –When? Steps in effective Crisis Management Aon’s capabilities.
National and International Development Strategy International Development Unit / Gordon Thomson / January 2016.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
RICKY MASON COMMUNITIES INSPECTOR THE NATIONAL INTELLIGENCE MODEL L DIVISION.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
CARL DAVIES HOME OFFICE PREVENT CO-ORDINATOR. CONTEST PROTECT - Infrastructure / Environment PREPARE - Mitigate Impact PURSUE - Catch those responsible.
WMD Operations Unit 1 slide 1 MODULE 2 UNIT 1 Training at the Awareness Level Review.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
… because safeguarding children is everyone’s responsibility Enfield Safeguarding Children Board (ESCB) Annual Report 2014/15 Geraldine Gavin – ESCB Independent.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
DHS/ODP OVERVIEW The Department of Homeland Security (DHS), Office for Domestic Preparedness (ODP) implements programs designed to enhance the preparedness.
Establishing an Aviation Risk Context APEC TPTWG-27 Aviation Security Experts Sub-Group Meeting Denise Morgan Office of Transport Security May 2006.
Prevent Information and Overview Updated March 2016 by the Central Secretariat.
Prevent - Stopping People Becoming Terrorists or Supporting Terrorism Detective Chief Superintendent Alan Lyon National Coordinator Prevent
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Securing Critical Chemical Assets: The Responsible Care® Security Code
Training at the Awareness Level Review
Cyber Security in a Risk Management Framework
Staff and Trainer Responsibilities explained:
Presentation transcript:

Threat into Risk: A Challenge for Security Guidance AusRAIL 2006 Tony Beard Office of Transport Security Department of Transport and Regional Services

OTS - Security Analysis  Facilitates and coordinates the communication of transport security related information to industry  Provides assistance to industry / business by provision of a nationally consistent risk context statement  Analyses maritime and aviation security events reported by regulated industry participants to inform the development of threat and risk based policy  Places specialist officers in each state capital city to enhance the flow of transport security risk context information between industry and government and implement a continuous program of security awareness raising

Current Security Environment Threats:  Al-Qa’ida and associated trans-national terrorism remains as principle global threat  Recent experience indicates rail systems are an attractive target.  Continued interest in IEDs  National CT Alert level remains at MEDIUM Current Issues:  “Home grown terrorism” a term that does nothing to define or assist in understanding the terrorist threat  Radicalisation processes are poorly understood  Racial profiling is problematic and not the answer  Extremist religious identity transcends national, social and family identity  Extremists can be known and tolerated within their local community

Nature of the Threat  Trans-national terrorism leads to traumatic, catastrophic consequences  Focus is on mass casualties  Terrorists have demonstrated intent and capability – coordinated attacks  There is constant heightened level of threat  Nature and level of threat means we Must Expect the Unexpected  There is likely to be no prior warning of attack  Criminal activity highlights vulnerabilities

The Threat to Rail and Mass Gatherings  The transport sector is a target for terrorists because it concentrates people: –in large numbers; –at high density; –in accessible places; and –at regular, predictable times  Forms of attack against the transport sector have included: –Attacks on mass transit; –Improvised explosive devices; –Assaults by commando-style teams; –The use of “stand-off” weapons (eg mortars and missiles) to attack infrastructure

Criminality and Transport Security  Terrorism is a crime – not all crime is terrorism  Professional organised criminals utilise vulnerabilities in aviation security regimes  Their actions highlight vulnerabilities that may facilitate terrorism  Criminals want to preserve the transport system for their own ends  Terrorists want to destroy the transport system for their own ends

RISK: Frames of Reference  AS/NZS 4360 Risk Management  Corporate Risk  Regulatory Risk  Security Risk

A Security Risk Doctrine as the basis for Mitigation Planning  Government policy – prevention is a business cost.  Security risk management by industry –1. Non proscriptive regulation –2. Provides flexibility to owner/operators –3. It s not possible to eliminate all threats  Highly professional attackers – no prior warning  Probability of coordinated IED attacks on mass gathering  Traumatic and catastrophic consequences are untenable  Governments have NO RISK APPETITE  Focus on Vulnerabilities and Suspicious Activity

Security Planning Requirements  In this threat environment, effective mitigation requires: ­ Planning be based on a security risk assessment ­ Consultation with internal & external stakeholders ­ The identification of vulnerabilities ­ Provision for reporting, logging and assessing security incidents ­ Provision for security awareness and training to ensure identification and resolution of suspicious activity  This can only be achieved through: ­ Having clearly identified roles and responsibilities across all partners.

“ Today we were unlucky, but remember we only have to be lucky once. You will have to be lucky always.” - from a statement by the IRA addressed to Margaret Thatcher

Building Key Partnerships  Partnerships harness and focus capacity  Physical security measures must be supported by a security risk doctrine that utilises key partnerships  Risk Action Plans will exhaust available resources, especially available police: –Need to augment available resources –harness business and general community –utilise technology – CCTV  Discussion Exercises (Desk-Top) ­ harness government and business ­ against a common mental model ­ routinely and regularly clarify: - roles and responsibilities - policy and planning short falls

Partnership Objectives To ensure:  Government agencies; Businesses and Communities are together creating an environment hostile to terrorist planning and preparation by: –Identifying and mitigating vulnerabilities; and –actively disrupting and resolving suspicious activity.

Security Awareness Raising  A common language is necessary  Security awareness training for staff, contractors and regular customers is essential  Security plans must include provisions for the reporting, logging and assessing of security incidents  Identification and resolution of suspicious activity is essential

Vulnerabilities  Vulnerabilities potentially amplify terrorist capabilities and therefore increases the chance of a risk eventuating  Vulnerabilities must be prioritised to focus and ensure proportional targeting of risk mitigation strategies there by best utilising resources  Vulnerabilities should be prioritised through an intelligence led assessment of likelihood and an understanding of the local security context.

The Challenge Ensuring that even if the bomb doesn’t go off this week:  Government remain focussed  Industry remain vigilant and prepared  Public interest and awareness is sustained

Summary  Our response to terrorism must be focussed and proportional and consider the following factors: –Constant heightened level of threat –Terrorists display significant personal and professional capability –No prior warning of attack  A risk based approach provides common language, ideas and focus  Our operating environment is complex and sound partnerships are essential to achieving an effective response  Government, industry and the public must remain focussed and alert to security issues