Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.

Slides:



Advertisements
Similar presentations
Lane Gewecke Consulting
Advertisements

Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Introduction to Information Operations Attaché Corps- SEP 09
NASSAU COUNTY POLICE DEPARTMENT Long Island Import-Export Association Surveillance Detection Briefing for Commercial Infrastructure Operators March 18,
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Political Crime and Terrorism Siegel 10th edition
Third Edition Dr. Wasim Al-Habil. Chapter Strategic Management in the Public Sector.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Ch 3 -1 External Strategic Management Audit – Environmental Scanning – Industry Analysis.
Chapter Eleven Political Crime and Terrorism. Political Crime Since 9/11 political crime and terrorism have become important areas of criminological inquiry.
Anatomy of Total Hospital Security Presented by: H. Edward Creamer Security Assessments International, Inc. June 16, 2005.
Network security policy: best practices
Army Doctrine Publication (ADP) 3-37; and Army
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 1 Introduction to Police Administration.
Force Protection. **Definition of terrorism “the unlawful use or threatened use of force or violence against individuals or property to coerce,
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
CITIZEN CORPS & CERT ORGANIZATIONS. What is Citizen Corps? Following the tragic events that occurred on September 11, 2001, state and local government.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
PREVENTION & RESPONSE “ARE YOU PREPARED” Security & Emergency Management Conference 1 June 2006 FA Frank Prendergast National Manager Counter Terrorism.
Community Partnerships as an Intelligence Resource.
Chapter 18- slide 1 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Chapter Eighteen Creating Competitive Advantage.
9 Terrorism as Organized Crime.
Protecting Emergency Responders Volume 3: Safety Management in Disaster and Terrorism Response Brian A. Jackson John C. Baker M. Susan Ridgely James T.
DP 3 : Hostile Groups’ freedom of action & sanctuary are denied SE 1a TGT/A Lead Supported (Supporting)EntitiesMOEsMOEIs Deny hostile groups’ movement.
Battle Drills Break Contact React to Ambush React to Contact
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
IAFS 1000 Terrorism. Dinner See evite Paper Presentations Dec min. talk, 6 min. Q&A Clearly and concisely summarize: –Argument –Evidence (analysis.
Terrorism.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Welcome to Unit 8 Tina Mainwaring
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Navy Doctrine for ATFP NWP HM1 (SW/AW) Alburg.
Ngafla Bakayoko Yolanda Alvarez Jimena Galdos.  The political use of violence or intimidation (The American Heritage Dictionary)  “the unlawful use.
What is…? Strategic communication is a planned series of sustained and coherent activities that develop and promote ideas and opinions with the objective.
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
1 Performance Management and Appraisal Chapter 9.
Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc. Introductory Criminal Analysis: Crime Prevention and Intervention.
Effective Training: Systems, Strategies, and Practices, 4 th Edition Chapter Two Aligning Training with Strategy P. Nick Blanchard and James W. Thacker.
Prepare + Prevent + Respond + Recover + Mitigate Preparedness Section Planning Branch 1.
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
“RISKY BUSINESS” THE POLICE PERSPECTIVE Overview UCPD Roles Post 9/11/01 Issues.
SEC 420 Entire Course (UOP) For more course tutorials visit  SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection.
 War  Guerrilla war  Terrorism  Coups d’état  Assassination  Economic/property damage  Sabotage  Riot Continuum 1.
SEC 420 Entire Course (UOP) SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection Officers Paper 
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
SEC 420 aid Expect Success/sec420aiddotcom FOR MORE CLASSES VISIT
SEC 420 UOP professional tutor / sec420dotcom.  SEC 420 Entire Course (UOP)  SEC 420 Week 1 DQ 1 (UOP)  SEC 420 Week 1 Individual Assignment Responsibilities.
SEC 420 Entire Course For more classes visit SEC 420 Week 1 Individual Assignment Responsibilities of Personal Protection Officers.
Office Mix Final project slideshow By. Dwayne Williams Jr 06/20/2016.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Chapter 16 Terrorism and National Security.
Maritime Security as an Integral Part of an
Disaster and Emergency Management
MKT 575Competitive Success/snaptutorial.com
MKT 575 Education for Service-- snaptutorial.com
Women, Peace and Security
Federal Protective Service
Operations Security (OPSEC)
Government Final Exam Review
Terrorism.
CMD LOGO Operations Security (OPSEC) Assessment in-brief Presenter
Business Continuity Program Overview
Performance Management and Appraisal
Prevention, Intelligence
AJ 001 Introduction to AJ Terrorism.
Presentation transcript:

Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security

Terrorism Defined PremeditatedThreatening innocent to create fear DeliberateIntimidation to gain a political or tactical advantage Systematic murderTo influence an audience Mayhem

The End Introductory Criminal Analysis Thomas E. Baker PRENTICE HALL ©2005 Pearson Education, Inc.

Purpose of Terrorism  Seize political power  Affect public opinion and seize the media  Maintain internal discipline  Discredit and disrupt the government  Win new members  Project strength that far exceeds their numbers

Terrorist Goals  Discourage impending foreign investments or foreign government assistance programs  Influence elections

Terrorist Goals  Free prisoners  Satisfy vengeance  A series of goal-oriented attacks to wear down the local government and achieve their long-range goals

5 Forms of Terrorism Ideological Criminal Revolutionary Nationalistic State-sponsored Criminal

Criminal Terrorism  Involves use of terror for profit or psychological gain Criminal

Ideological Terrorism  Normally an effort to change ruling political power  Some governments employ use of death squads.  Actions might appear to be part of a repressive government.  Actually extension of revolutionary terrorists

Nationalistic Terrorism  Different from ideological terrorism  Terrorist activity that supports interests of an ethnic or nationalistic group  Regardless of political ideology  Often align with either Western or Eastern ideologies

State - Sponsored Terrorism  Governmental regimes use or threaten to use violence in international relations outside established diplomatic protocol.  Represents a low-risk, low-budget method of conducting foreign policy

Revolutionary Terrorists  Persons whose guerrilla like tactics invokes fear in those holding political power as well as their supporters  Goal is to overthrow the current power base and replace it with political leaders who share the views of the terrorists.

Hardcore Leadership Command Active cadre Active supporters Passive supporters

Typical Smaller Terrorist Group Command element Intelligence section Support section Tactical units

Countering Terrorism  Anti-terrorism (proactive)  Planning and training  Counter-terrorism (reactive)  Response to an on- going terrorist incident (tactical stage)

NYPD Spies on American Muslims  Please check this out and let me know when you return.  My mic will be turned off.  com/watch?v=T4XY 1wlo8Zw com/watch?v=T4XY 1wlo8Zw

NYPD Spies on American Muslims  com/watch?v=ZGvv oEq_TaQ com/watch?v=ZGvv oEq_TaQ  I will be turning off my Mic  Remember to let me know once you have returned.

Terrorism Response Model AntiterrorismCounterterrorism Terrorism Collecting intelligence Analyzing vulnerabilities Preventative measures Planning for crisis management Responding to terrorist incident Crisis management

Anti-Terrorism Program Measures  Proactive phase  Preventative stage of countering terrorism  Basic crime prevention surveys  Target hardening procedures  Planning and training

CounterTerrorism Reactive tactical operations Gathering information Planning and trainingAnalysis On-going incidentReactive stage of countering terrorism

Threat Analysis  Criminal Information + Threat + Vulnerabilities = Threat Analysis

Threat Analysis  Analyze target vulnerability to terrorist threat  Uncover and isolate security weaknesses

Identify the Threat  Critical Phase of Counterterrorism Program  Gathering information on terrorist threat  Gathering intelligence on terrorist threat  Firm understanding of open-source information  Criminal information  Intelligence

Threat Analysis  Ability to think like a terrorist  Develop potential scenarios  Identify and counter threat  Consistent evaluation of threat  Use operations security (OPSEC)  Crime prevention and threat committees

Proactive Antiterrorism Dimensions Law enforcement patrol & reactive responses Operations security Personal security Personal security operations internal & external Crime prevention proactive responses, Problem-oriented policing

Operations Security  Objectives of operations security are to:  Avoid stereotyping operations  Understand techniques used by terrorists to collect intelligence

Operations Security (continued)  Integrate operations security aspects into physical and personnel security programs  Deny intelligence and information to the adversary  Develop essential elements of friendly information

Security Measures Desire + Opportunity = Crime

Crime Prevention  Crime Prevention:  Essential element of model  Three major security components  Operational  Personnel  Physical

Crime Prevention Measures Suggested in Model  Extensive  Unique characteristics of terrorist threat  Include special procedures for responding to:  Bombings  Bomb threat  Protecting high-risk targets  Facilities  Personnel