Homeland Security: Emerging Security Needs Casualty Actuaries in Reinsurance Special Interest Seminar: Terrorism September 13, 2004 New York, NY Asha M.

Slides:



Advertisements
Similar presentations
Homeland Security and Law Enforcement Created By: Ashley Spivey For _Local_Actions_for_Homeland_Security.pdf.
Advertisements

WMD Crime Scene Management
Homeland Security and the Future of Criminal Justice.
GISE April, 2014 Tran, Thi Thuy Vuong I35028.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Exploring American History Unit X – Modern America Chapter 31– America Looks to the Future Section 2 – George W. Bush in Office.
Information Warfare Theory of Information Warfare
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Asia Pacific Economic Cooperation Transportation Working Group ITS Experts Group Chicago, Illinois September 2002 Walter Kulyk, P.E. Director, Office of.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
PPA 573 – Emergency Management and Homeland Security Lecture 5a- What is Homeland Security?
MAXWELL SECURITY AUTHORITY. THE THREAT: The TERROR PLOT of AL QAEDA.
C4ISR and Information Warfare
Submitted by: Abhashree Pradhan CA (1)
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Radiological Terrorism: Introduction. Nuclear WMD Modern time weapons First used in WWII.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
Fostering a ‘Whole Community’ Approach to Emergency Management David J. Kaufman Director, Office of Policy and Program Analysis 8 June 2011.
The National Resilience Development Act and the War on Terror Opening up the Third Front.
Agricultural Investigations Law Enforcement Perspective.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Warfare Playgrounds to Battlegrounds.
Force Packaging. Overview Principles of War Process of Force Packaging Developing Packages.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
1 Terrorist Use of WMD: A Concrete Threat? Dr. Yair Sharan –ICTAF Director 2nd Annual Arms Control Conference: New Trends in WMD.
The Threat of Agroterrorism Emily Baker CHSC. Importance of US Ag Sector “U.S. agriculture generates more than $1 trillion per year in economic activity.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
1 The U. S. Coast Guard Maritime Strategy for Homeland Security Captain Dan Deputy Chief of Cutter Forces, U.S. Coast Guard Headquarters Captain Dan Deputy.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
Terrorism & Bioterrorism Communication Challenges Module 9.
Chapter Six: Types of Modern Terrorism. Cyberterrorism.
United States Air Force: Air Doctrine – Provide Global Capability
Bronx Engineering & Technology Academy AIM: What is Terrorism? Do Now: Define Terrorism Terrorism.
ISSUES OF NATIONAL SECURITY ARE NO LONGER SIMPLE!
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
Information Warfare Playgrounds to Battlegrounds.
A /02 Issues in bioterrorism response Nicole Lurie, M.D., M.S.P.H. RAND.
9-11 Commission Report: Implications for Transportation Security in the NY/NJ Region Eva Lerner-Lam and David Gaier Transportation Security Committee Transportation.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Chapter 8 War and Strife. Security Issues Global trends, see: –Human security.
Horizon 2020 Secure Societies Disaster-Resilience Workshop 18 Mar /06/2016.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Risk Assessment: A Practical Guide to Assessing Operational Risk
Homeland Security Grants. Presidential Decision Directive 1998 – PDD 62 –Fight against Terrorism a top national priority Counter Terrorism tools Improve.
Chapter 13: Police Strategies and Tactics Seminar 8.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Homeland Security Grants. Presidential Decision Directive 1998 – PDD 62 –Fight against Terrorism a top national priority Counter Terrorism tools Improve.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Chapter 16 Terrorism and National Security.
GOVT Module 16 Defense Policy.
Maritime Security as an Integral Part of an
Disaster and Emergency Management
Joint Force Headquarters-Michigan CCIRs and PIRs
Critical Infrastructure Protection Policy Priorities
Joint Force Headquarters-Michigan CCIRs and PIRs
The U.S. Department of Homeland Security
Operations Security (OPSEC)
Prevention, Intelligence
Presentation transcript:

Homeland Security: Emerging Security Needs Casualty Actuaries in Reinsurance Special Interest Seminar: Terrorism September 13, 2004 New York, NY Asha M. George, DrPH Threats Division Manager Homeland Security Institute

2 “The increasing availability of relatively inexpensive cruise missiles and the capability to fabricate and introduce bio- toxins and chemical agents into the US means that rogue nations or transnational actors may be able to threaten our homeland” - Report of the National Defense Panel, 1997

3

4 Nuclear vs. Biological Lethality Congressional Office of Technology Assessment, 1993

5 Caught By Surprise World Trade Center Bombing of the Murrah Federal Building in Oklahoma World Trade Center/Pentagon Anthrax We may not be able to prevent events from occurring. We can at least keep ourselves from being surprised.

6 PreventDeterPrepareDetectRespondRecoverMitigate Understand the Threat Partner with Others

7 Intelligence Information collected Put together with other information Then all of it is analyzed End product is what we call intelligence In the homeland security context, Info 1 is provided by state and local personnel Analysis [ Collect (Info 1 +Info 2 +…Info X ) ] = Intelligence

8 AWARENESS ATTITUDEBEHAVIOR BELIEF Awareness vs. Belief: Awareness Drops Out

9 Vulnerabilities X Intentions X Capabilities = Threat Threat X Vulnerability X Asset Value = Risk Simple Equations to Characterize

10 Threat Continues to Change The enemy continues to find ways to get through our defenses and exploit our vulnerabilities. Just as disease knows no borders, neither do crime, weather, and any number of other things that produce insecurity and terrorism. Society is continuing to become more connected.

11 The single biggest threat to man’s continued dominance on the planet is the virus.” - Joshua Lederberg, PhD, Nobel laureate Electron micrograph of Ebola virus

12

13

14 Smallpox

15

16

17

18 What We Should Expect Changes in terrorist tactics, methods and operational activities occur naturally – if only because vulnerabilities, risks, technological abilities, etc., of targets are also changing Lack of wherewithal regarding and interest in conventional operations – if only because they require huge resources and will certainly result in military response and other types of retaliation Unexpected, innovative, non-traditional and broadly applicable methods

19 Characteristics Small-scale high-impact operations As with everything else in society, terrorism drives towards greater efficiency and effectiveness, expending the least amount of resources to achieve the largest results Unequal action taken to rectify societal inequality? Reaction to disproportionate power by using a weapon that wields disproportionate power itself?

20 Top Priority for Terrorism Attack  Fear + Chaos  Civil Unrest  Societal Breakdown How? By: –Undermining the strengths of a target –Exploiting the weaknesses of a target –Maximizing their own advantage –Attaining control –Gaining freedom to take any action they please

21 Effect Multipliers M 1 : Ability to disrupt electronic infrastructure M 2 : Ability to generate fear M 3 : Ability to utilize psychological operations M 4 : Ability to prevent action, response, retaliation, etc. M 5 : Ability to decrease initiative M 6 : Ability to introduce weapons of mass destruction and/or related materials M 7 : Ability to fight in environments that degrade capacity for military response and retaliation M X : Ability to ______

22 Vulnerabilities Infinite array of vulnerabilities for society – Finite array of vulnerabilities for an organization Weakness in defense Weakness in preparedness Highly mobile population Enjoyment of congregation Population density and lack thereof Unprotected agricultural production areas Federal (as opposed to National) intelligence apparatus Lack of specific guidance to individuals Porous borders Inadequate transportation safety Lack of coordinated activities and databases

23 Vulnerabilities (continued) Disorganized infrastructure elements Squishy cyberspace Inability to communicate and work with other countries Science, tools and technology not matched against threats, risks and vulnerabilities Disarray of public health and other infrastructures Inability to address the truly difficult tasks (e.g. Select Agent Program) Holes in existing law Inability or lack of willingness to share information Split and heavily occupied military forces Increasing deficit Etc.

24 Impact of a Terrorist Attack Resources + Unexpected Methods + (Understanding + Exploitation)Vulnerabilities + Effect (M 1 +M 2 +M 3 +M 4 +M 5 +M 6 +M 7 +…M X ) = Impact

25 Identification of Atypical Trends Ongoing observational data Feed into successively broader surveillance and analysis systems Information must be fed back as soon as possible Surveillance needs to be more than routine

26 Basic Model for Trend Research

27 US Homeland Security Advisory System LOW Low Risk of Terrorist Attacks GUARDED General Risk of Terrorist Attacks ELEVATED Significant Risk of Terrorist Attacks HIGH High Risk of Terrorist Attacks SEVERE Severe Risk of Terrorist Attacks

28 View of Homeland Security PUBLIC SAFETY NATIONAL SECURITY HOMELAND SECURITY

29 View of Homeland Defense CONSEQUENCE MANAGEMENT SUPPORT DEFENSE & DETERRENCE HOMELAND DEFENSE

30 International Cooperation National Security Homeland Security Combating Terrorism Combating WMD U.S. INTERNATIONAL AGENDA

31 Space Between stimulus and response, there is space. In that space is power to choose our response. In our response lies our growth and our freedom. - Stephen Covey

32