TOTAL DEFENCE STRATEGY CARD GAME

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

© 2012 Delmar, Cengage Learning Section V Getting the Job Done… Through Others Chapter 13 Deploying Law Enforcement Resources and Improving Productivity.
Forms of Cyberbullying
Marie DeffayetLeaksmy Reth. The attacks in Paris killed 17 people, including four cartoonists who worked at the satirical newspaper Charlie Hebdo, four.
Why the European union? Jofre Cabrera, Marc Conde, Xiao Bin, ArnauTharrats.
 Before you attempt the question given to you as an assignment … you must take note of the following information: ◦ A primary goal of terrorism is to.
Bullying and Harassment Sian Jackson Semester 2, 2010.
Social impacts of the use of it By: Mohamed Abdalla.
Study Results Advanced Persistent Threat Awareness.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
5.1 Preventing Violence and Abuse. Key Terms What is Conflict? Another name for a fight or disagreement What is Violence? Physical or non-physical force.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
Digital Security Kristin Fedora October 5, Digital Security Def: The precautions that all technology users must take to guarantee their personal.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Babak Akhgar, Simeon Yates & Eleanor Lockley Chapter 1 - Strategy Formation in a Globalized and Networked.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
ISSUES OF NATIONAL SECURITY ARE NO LONGER SIMPLE!
Active Shooter Incidents
Respectme, Scotland’s Anti-Bullying Service Lisa Armstrong Online Safety Training.
Safeguarding Our Schools Against Terrorist Activities Texas School Safety Center Texas State University- San Marcos.
Bismarck’s System of Alliances The House of Cards.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
Freedom v. Security during WWI. Debt Reduction Every year the government spends more money than it raises from tax revenue. It is able to do so by borrowing.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Protecting Houses of Worship Security Plan Development Considerations Glenn Moore Protective Security Advisor – Oklahoma District National Protection and.
Do-First Review Foreign Policy Notes. IE: 4 Major Reasons for US Involvement in affairs of other countries 1)Why does the United States get involved in.
Into a New Century The War on Terrorism. September 11, 2001  Two airplanes hit the World Trade Center and a third hit the Pentagon A fourth plane was.
Radicalisation in Cumbria
Bullying & Cyber Bullying
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
BAE systems Research results October 2016
Total Defence Day 2017 P6 Cohort Activity
Moraitis School English Department made by: Panagiotis Giannis, Stelios Laliotis, Nicolas Kalyvas, Manos Giavridis.
How to be safe while RVing
[Internal Use] for Check Point employees​
How to use the internet safely and How to protect my personal data?
Cyber Bullying BY PHONE.
Information Security.
Online Safety! By: Michelle Deng.
How to use the internet safely and How to protect my personal data?
Southwark Prevent programme
We celebrate 26/11 every year as the CITIZEN ACTION PLEDGE DAY
Challenges We Face On the Internet
Is Our Defence Force Weakening?
Carroll County Schools Advisement
How many of these apps do you really know?
“All Different, All Equal”
Violence in America.
Digital Citizenship & Social Media.
The Sustainable and Resilient
Join In Be Secure Presentation
What is bullying?.
Be Safe, Be Seen, Be Secure
Prevent Matching Card Game
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
Section 4-America Moves Towards War
Operation Overlord June 6, 1944 D-Day.
2018 National Runaway Prevention Month
Bullying.
America Moves Toward War
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino

Preparing for a Terrorist Attack Indian Point Energy Center
Reflecting on the Viability of Liberalism
Deborah Housen-Couriel, ADV.
Cybercrime By: Kimberly Foreiter
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Health, Social and Environmental Responsibility
TALKING POINTS Introduce yourself
Presentation transcript:

TOTAL DEFENCE STRATEGY CARD GAME

18/6/2018 Understand that Singapore’s peace and security should not be taken for granted. Appreciate the complexity of the threats facing Singapore, the need for trade-offs, and the impact of everyday decisions on the fight against terrorism. Recognise that simple yet concrete actions can help our family and friends be more prepared for crises.

Allocation of 11 National Effort points across the TD pillars. 18/6/2018 Allocation of 11 National Effort points across the TD pillars. What were your considerations in allocating your National Effort levels?

Allocation of 11 National Effort points across the TD pillars. 18/6/2018 Allocation of 11 National Effort points across the TD pillars. How did you feel having to choose one pillar over another when assigning National Effort levels?

Allocation of 11 National Effort points across the TD pillars. How did you resolve disagreements with your teammate over the distribution of National Effort levels?

or protecting your citizen groups (defensive strategy)? 18/6/2018 Playing Action Cards Were you playing a game that focused on eliminating terrorists (offensive strategy) or protecting your citizen groups (defensive strategy)? Did you come across cards that had an impact on both terrorists and citizens?

Reacting to effects of Crisis cards How prepared were you for crises?

Reacting to effects of Crisis cards Did your strategies change after you were hit by crises?

Gameplay and strategy If you were to play the game again, what are some things you would do differently?

On 13 November 2015, Paris suffered multiple attacks in restaurants, a sports stadium and a concert hall, which claimed the lives of more than 120 victims.

Look at the Action cards What can we do to prepare ourselves for an incident like this? What are some ways in which we can respond when an incident like this happens? How can we help our society recover from such an incident quickly?

Terrorism is a real and present danger Terrorism is a real and present danger. It is not a matter of “if” but “when” an attack will happen. We need to support our National Servicemen when they are called up for training or operations to keep us safe and secure.

In 2015, a cyber-attack disabled a power grid in Ukraine. In 2016, hackers disrupted access to popular websites like Amazon, Twitter and Spotify in the US and Western Europe. In the same year, attacks on Starhub’s broadband network caused disruptions in Internet surfing in Singapore.

for an incident like this? Look at the Action cards What can we do to prepare ourselves for an incident like this? Look at the Action cards

Terrorists can carry out cyber-attacks that could cause significant damage to our economy and disruptions to our daily lives. We can play our part by adopting good cyber-security practices.

During a fireworks display in Nice, France, to mark Bastille Day (14 July 2016), a Frenchman drove a truck through the large crowd, killing about 84 people. On 19 December 2016, a Tunisian, hijacked a truck and rammed it into a Christmas market in Berlin, Germany, killing 12 people and injuring 48.

Look at the Action cards What can we do to prepare ourselves for an incident like this? What are some ways in which we can respond when an incident like this happens? How can we help our society recover from such an incident quickly?

There is an increasing number of self-radicalised individuals who attack everyday venues using ordinary objects. Our security agencies cannot be everywhere all the time, so we need to play our part by staying vigilant and keeping a lookout for suspicious characters and activities.

In December 2016, police cautioned the public against spreading a text message circulating on WhatsApp containing rumours about potential attacks in popular shopping areas such as Orchard Road. This incited unnecessary fear and public alarm.

Look at the Action cards What can we do to prepare ourselves for an incident like this? What are some ways in which we can respond when an incident like this happens? How can we help our society recover from such an incident quickly?

Do not believe everything you read online Do not believe everything you read online. Check your facts and think about the implications of your actions before sharing. We can play our part by strongly rejecting messages that seek to incite hatred or discrimination against our fellow Singaporeans.

We cannot take our peace and security for granted. We’re facing Increasingly complex threats. We cannot take our peace and security for granted.

There are trade-offs and consequences to our actions.

Everyone needs to play a part, not just our security forces.

There are many things we can do to put Total Defence into action.