Indicators of Terrorist Activity Handbook US Coast Guard Headquarters Port Security Evaluation Division (CG-3PCP-4)

Slides:



Advertisements
Similar presentations
Idaho Critical Infrastructure and Key Resources Protection Program and Fusion Center Brief.
Advertisements

Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
National Maritime Law Enforcement Academy NMLEA Academy Overview and Maritime Critical Incident Response.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
COMDTINST AWW is an outreach and awareness effort
[Exercise Name] Final Planning Conference [Date] Final Planning Conference [Date]
EDS Public Information Tabletop Exercise
National Infrastructure Protection Plan
NASSAU COUNTY POLICE DEPARTMENT Long Island Import-Export Association Surveillance Detection Briefing for Commercial Infrastructure Operators March 18,
The Role of ITS Technology for Homeland Security Kentucky’s Experience.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Fiscal Year 2008 Urban Areas Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Accident Causes, Prevention and Control
From original work by C.Mueller-Ahsmann 2004 The Cycle of Analysis NQ Physical Education A process to improve performance.
Jeffery J. Gust IOWA INDUSTRIAL ENERGY GROUP FALL CONFERENCE Tuesday, October 14, 2014 MidAmerican Energy Company.
Computer Security: Principles and Practice
FSIS’ Innovative Food Security Initiatives Carol Maczka, Ph.D. Assistant Administrator USDA Food Safety and Inspection Service Office of Food Security.
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
Introduction to Network Defense
Capability Cliff Notes Series PHEP Capability 11—Non- Pharmaceutical Interventions What Is It And How Will We Measure It?
/0503 Copyright ©2005 Business and Legal Reports, Inc. BLR’s Safety Training Presentations Hazardous Materials Transportation 49 CFR BLR’s.
Maritime Security Risk Analysis Model
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
Homeland Security Advisory System protectivemeasures vulnerability responseFederal departments and agencies would implement a corresponding set of protective.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Select and Develop Top Performing Sales Professionals Introducing SalesMax Revised 10/2005.
May 8, 2012 MWP-K Learning Event Monitoring, evaluation, and learning (MEL) framework for the Millennium Water Program, Kenya.
EDS Incident Command System Tabletop Exercise [Exercise Location] [Exercise Date] [Insert Logo Here]
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
U. S. Coast Guard Requirements Maritime Security.
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
MODULE 2 11SR VE WORKSHOP MARINE DOMAIN AWARENESS Please make MDA part of your VSC Education. In some Sectors there is a special form to report MDA contact.
Title: U.S. Department of Homeland Security Small Vessel Security Strategy Author: Sean K. Moon Economy: United States of America.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Why Participate in the WLA? Utility Perspective Preparation Emergency Response Plan Resources.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
A-801 Wednesday Section 1 W EDNESDAY, 31 ST O CTOBER, – P. M.
Security aspects in the construction and maintenance of infrastructures of the inland transport sector Richard Harris Director Intelligent Transport Systems.
U. S. Coast Guard Security Maritime Transportation.
RESPONSIBLE CARE ® SECURITY CODE Daniel Roczniak Senior Director, Responsible Care American Chemistry Council June 2010.
U.S. Department of Transportation Federal Highway Administration 1 Adaptation to Global Climate Change Effects: FHWA Activities AASHTO Subcommittee on.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Cyber Storm Overview Wednesday 2/1/ PT. Cyber Storm Cyber Storm National Cyberspace Security Exercise Mandated in National Strategy to Secure Cyberspace.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
[Exercise Name] Initial Planning Conference [Date] Initial Planning Conference [Date]
Federal Transit Administration Robert J. Tuccillo Associate Administrator for Budget and Policy/Chief Financial Officer Performance-Based Reauthorization.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
Homeland Security UNCLASSIFIED Coast Guard Cyber Strategy Awareness Training.
INMM Nuclear Security and Physical Protection Technical Division.
Civil Aviation Security Program The FBI’s Counterterrorism Division’s (CTD) Civil Aviation Security Program (CASP) is responsible for Criminal and Terrorism.
Establishing an Aviation Risk Context APEC TPTWG-27 Aviation Security Experts Sub-Group Meeting Denise Morgan Office of Transport Security May 2006.
Threat into Risk: A Challenge for Security Guidance AusRAIL 2006 Tony Beard Office of Transport Security Department of Transport and Regional Services.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Status Report to the President under EO EPA ACTIONS 1 Executive Order: Improving Chemical Facility Safety & Security.
REGIONAL RESPONSE TEAM NOVEMBER 5, Executive Order: Improving Chemical Facility Safety & Security.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Protecting Houses of Worship Security Plan Development Considerations Glenn Moore Protective Security Advisor – Oklahoma District National Protection and.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Headquarters U.S. Air Force
TWIC Training & Maritime Security Awareness
Office of Port and Facility Compliance (CG-FAC)
CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter
Securing Critical Chemical Assets: The Responsible Care® Security Code
Bomb Threat Response/Management Principles
Presentation transcript:

Indicators of Terrorist Activity Handbook US Coast Guard Headquarters Port Security Evaluation Division (CG-3PCP-4)

Background & Context Protecting High Consequence CI/KR has led to Higher Physical Security since 9/11 –Heightened Physical Security means that Terrorists must plan more to overcome these security measures –Effective attack plans require information about the current security posture (they must know what they have to defeat in order to be successful) Terrorist Training and Planning can take years to unfold Port Security Terrorist Operations Assessments used Navy SEALs to provide the adversary perspective –Identified a growing requirement for better “outside the fence” awareness

Physical Security Posture Improved security attributed to: –MTSA –Industry Associations –LEA –Government Grants –Corporate Capital Investment –Security Officer Equipment & Training –Best Practices Dissemination

Physical Security Posture What to protect? –Critical Components From what? –Plausible Threat Scenarios that result in high consequences –Review all threats (e.g., car/truck bomb, boat bomb, commercial vessels, swimmers, etc.) in context of consequence

Threat Vectors Assets that are not high-consequence themselves (e.g., pilot vessels, fuel barges, tugs, etc.), but whose routine access to critical assets might be exploited Lower security procedures regarding the less critical asset may be overcome and used as a means to threaten the high consequence asset

Physical Security Posture: How Protected? What physical security measures are in place to address the plausible threats? The Four ‘G’s –Guards, Gates, Guns, and Gadgets –Catchy phrase to address the many aspects of physical security to include: Barriers, Access Control, CCTV, IDS, PPE, Security Training, etc. Role of facility, local, state and federal resources Terrorists need “eyes on” the intended target to gather this type of information; it’s critical to a successful plan of attack

Indicators of Terrorist Activity Terrorist information gathering and planning, and our ability to impact their planning cycle, is addressed through the following topics: –Observation Points and Surveillance Areas –Staging Areas and Ingress Routes –Probing Security –Recognizing and Reporting Suspicious Activity

Observation Points and Surveillance Areas What are they? –Usually outside the perimeter –Provide view of critical components or key security measures How are they determined or identified? –Elevation, concealment, access What to do once they are identified? –Security Forces tend to focus inside the fence –Countermeasures can be identified

Observation Points and Surveillance Areas

Staging Areas and Ingress Routes What are they? –Usually outside or approaching the perimeter –Provide access or route to critical components or key security measures to be defeated How are they determined or identified? –Staging of vessel, vehicle, equipment, explosives –Ingress providing most effective access to CI/KR What to do once they are identified? –Awareness programs at nearby potential staging areas –Monitor potential ingress routes and choke points to give early warning of attack in progress

Staging Areas and Ingress Routes

Probing Security A higher security posture may require probing activity by terrorists to elicit a security response that can be measured or evaluated May be related to site security, LEA, USCG, etc.

Reporting of Suspicious Activity How are suspicious activities recognized and reported? What information is collected and reported? How are reports investigated? Is information collected in a database? Shared with other LEA? Are programs that educate the public in use?

Summary Handbook Objectives –Define Current Security Posture Identify Critical Components, Plausible Threats, Threat Vectors, Physical Security Measures, etc. –Identify Potential Indicators: Observation Points or Surveillance Areas Staging Areas and Ingress Routes Probing Activities –Identify Awareness Programs and Training –Identify Actions to be Taken

Next Steps Training and guidance for Sector Port Security Specialists Industry volunteers identified (5-10 sites) Industry Handbook use coordinated with Port Security Specialist Industry feedback consolidated by Sector and provided to HQ Incorporate improvements and publish final version of Handbook