With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

RULES OF ENGAGEMENT NOTHING IN ROE LIMITS YOUR INHERENT AUTHORITY AND OBLIGATION TO TAKE ALL NECESSARY AND APPROPRIATE ACTIONS TO DEFEND YOURSELF, YOUR.
ANTITERRORISM Terrorism has become a media event and, as such, a phenomenon of our time. Terrorist frequently claim affiliation with what types of causes?
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Exploring American History Unit X – Modern America Chapter 31– America Looks to the Future Section 2 – George W. Bush in Office.
JUNIOR SAILOR ADVANCEMENT WORKSHOP (JSAW) CTO1(SW) Germean Porter NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Cyber-Warfare: The Future is Now!
Chapter Eleven Political Crime and Terrorism. Political Crime Since 9/11 political crime and terrorism have become important areas of criminological inquiry.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 1 Introduction to Police Administration.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Chapter 4.  Can technology alone provide the best security for your organization?
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Economic security of enterprise.. By economic security of the enterprise (ESE) we mean the state of protection of it’s vital interests from internal and.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Joint Training Challenges of Irregular Warfare/COIN and Full Spectrum Training Requirements Brief for WJTSC LtCol John Merna, J7/9-TJ 23 September.
ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Bronx Engineering & Technology Academy AIM: What is Terrorism? Do Now: Define Terrorism Terrorism.
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Hurdles in implementation of cyber security in India.
1 - AN OVERVIEW. 2 DEFINITION Rules of Engagement (ROE) are orders issued by competent military authority that define the extent to which military personnel.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
CONTROLLING INFORMATION SYSTEMS
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
1. 2 Reducing Crime and Anti-Social Behaviour 3 On a typical Day, Essex police:
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Chapter 16 Terrorism and National Security.
Disaster and Emergency Management
Crimes Against Property
COSC 316 Final Presentation
Joint Force Headquarters-Michigan CCIRs and PIRs
Crimes Against Property and Defenses
What is terrorism? There is no agreed definition of terrorism internationally. The UK’s Terrorism Act 2000, defines terrorism as: The use or threat of.
Chapter 11 crime and security in the networked economy
Joint Force Headquarters-Michigan CCIRs and PIRs
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Do Now: How would you define terrorism? Please give examples that demonstrate your definition.
National Response Center (NRC)
Federal Protective Service
Disaster and Emergency Management
Chapter 13 Globalization and Terrorism: Our Small World
Operations Security (OPSEC)
Automating Profitable Growth™
Internet Vulnerabilities & Criminal Activity
Electronic Surveillance, Post 9/11
Training at the Awareness Level Review
Prevention, Intelligence
AJ 001 Introduction to AJ Terrorism.
TERRORISM Terrorism—the planned threat or use of violence, often against the civilian population, to achieve political or social ends, to intimidate opponents,
S&T Main Focus Areas Linkages to 2018 NDS
Role of US Security and Intelligence Agencies
Deborah Housen-Couriel, ADV.
Small unit proficiency
Criminal Investigations
Presentation transcript:

With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become as diverse as our mission.

The ARNG’s assets and diverse mission has exposed the organization to targeting of foreign and domestic terrorist intentions. The threat to the ARNG is significant and there are no affiliated persons immune from the risk of terrorist attack. Terrorist organizations continue to become tactically and technologically advanced, and possess the capability to strike anywhere in the world. Employed are as diverse as the organizations themselves. Certain groups remain intent on acquiring, developing, and employing Weapons of Mass Destruction (WMD). Their ideologies range from: - POLITICAL - RELIGIOUS - REVOLUTIONARY - ENVIRONMENTAL - SPECIAL INTEREST - NARCO

The ARNG is highly susceptible to criminals intent on gaining profit from the theft of state and government property. There are varying degrees of crime that pose a threat to the ARNG’s operational capabilities. The following are the most significant threats...

Professional criminals, with various degrees of training. Conduct surveillance, possibly infiltrate the ranks, and plan in detail. May possess advanced equipment for unlawful entry into facilities and secure areas. May be affiliated with terrorist organizations. Targets include, but are not limited to: - All caliber firearms - Ammunition and explosives - Pharmaceuticals (controlled substances) - Military communications equipment - Identification production equipment - U.S. Government vehicle tags - Specialized equipment (night vision, etc.)

Person or group of persons with little or no training. May be affiliated with terrorist organizations. Conduct little or no surveillance and planning. May or may not possess advanced equipment. Typically destroy established security measures to gain access. Commit criminal acts for personal gain. Target items that can be easily sold: - Common caliber weapons (M9, M590, M4/16) - Common caliber ammunition - Tools - Pharmaceuticals (controlled substances) - Office equipment (computers, copiers, etc.)

The presence of gangs and gang members within the ARNG’s units, near installations and armories pose a significant threat to personnel and property. Gangs operate in a similar manner to organized criminals. May posses equipment comparable to organized criminals for unlawful entry. They act to amass weapons to counter their rivals and acquire items that can be sold to fund their activities. Target items that can be sold: - Common caliber weapons (M9, M590, M4/16) - Common caliber ammunition and explosives - Vehicles - Pharmaceuticals (controlled substances) - Specialized equipment (night vision, etc.) - Office equipment (computers, copiers, etc.)

Pose a significant threat to the ARNG. Their actions whether foreign directed or domestically derived, can have a catastrophic impact on operational capability. Saboteurs generally strike… - Mission-critical personnel - Manufacturing facilities - Transportation hubs - Communication nodes - Ammunition, explosives, and fuel depots

Vandals are an imminent threat to ARNG assets. Incidents of vandalism are the most commonly reported. Vandalism can be costly, effect operations, and unit preparedness. Vandals range significantly in their ages and their reasons. Their acts include but are not limited to: - Breaking windows - Slashing Tires - Graffiti

The threat to ARNG automated information systems (AIS) is significant. Involve deliberate, overt, and clandestine acts to achieve desired results. Includes the theft or destruction of computer hardware and software. The information, not the systems that transports it, is the target.

These unauthorized users constitute most cyber attacks. In most instances, the challenge in accessing government systems is the sole motivation. They primarily attack computer-based systems, but are not limited to attacks on AIS networks and mainframes.

Individuals with legitimate access to AIS pose the most significant threat. Their motives range from personal conviction to monetary compensation. Whether recruited or self-motivated they are the hardest to defend against.

Have embraced technology to accomplish their target selections, intelligence collection, and operational planning. Unauthorized access to AIS has increased the possibility of critical data being manipulated or destroyed. By gaining access to a computer network they can increase their probability of success.

Operate overtly and clandestinely to gain access to, and steal, military information. Their collection efforts take place wherever possible to engage the targeted individual with minimum risk to the collector. The collector(s) can acquire information through a variety of mediums to include electronic and physical surveillance. Generally highly trained, and able extract information with cunning and persistence. Highly trained to recruit individuals from whom to illicit information to further their national or organizational objectives.

This has been a general Domestic Threat Briefing created to instill awareness within ARNG personnel. Not all of the information presented will apply in all geographical locations. This information should be used as a reference to gauge your respective regional security posture.