3. Prevention Who’s responsibility is it? Protection of our citizens and CIKR is the responsibility of everyone! Partnerships must be formed and strategies shared.
4. Prevention Prevention starts with knowledge, understanding, and preparation “It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles…” SunTzu
5. Prevention Know your enemy’s intent. “Kill the Americans and their allies, civilian and military. It is an individual duty for every Muslim who can do it in any country in which it is possible to do it.” Osama bin Laden
6. “Do not seek any permission when it comes to the killing of the Americans"… "Fighting the devil doesn't need a religious edict, deliberation, prayer or guidance. They are the party of the devil and fighting them is the personal duty of our times.” Anwar al-Awlaki
7. Terrorism Awareness Terrorist Groups International Domestic Right Wing Left Wing Special Interest Groups State Sponsors Lone Wolves, etc.
8. Terrorism Awareness Key Points Jihadist movement is always evolving al-Qaeda to the Lone Wolf Effects of the Internet Difficult for counterterrorism efforts, but not futile! Terrorists are patient and meticulous planners
12. Look for suspicious behavior, appearances, and activity…Behavior Nervous Anxious/Excited Profuse sweating Hesitation Lying Hidden gestures and signals Avoiding eye contact Physical avoidance Mental stress Mumbling Praying
13. Identifying a Terrorist Appearance Doesn’t fit time, story, and/or event Not dressed for climate Multiple sets of clothing Carrying oversized bag/multiple bags on street Modifications to bags Electrical components coming from bag to hand Activity Interest in security measures Extended amount of time in areas that are unusual Constantly looking around Taking unusual photos and or video Avoidance of security and/or law enforcement
14. The ThreatHow Will They Attack? Explosives are still the terrorist’s weapon of choice. Why? Easy to acquire/make Easy to move and place Can be used remotely to avoid capture Low cost High Yield Difficult to detect
15. Execution of Threat Explosives Hand Placed IED Person Borne IED Vehicle Borne IED Delivery by Proxy Other WMD Concerns CBNR
17. Steps to Prevention Knowledge Understanding Assessment Planning Practice Reassessment
18. PreventionQuestions To Consider What is your risk level? Low/High Are you a potential target? What vulnerabilities or risks is your venue facing? Are you prepared? Can you prevent, deter, disrupt, delay, respond to, and/or mitigate a hazardous incident? Are you protected? Physical Liability
19. PreventionRisks and Vulnerabilities Assessment How do you know what to protect or how to protect it? There may be help! “Protected Critical Infrastructure Information Program” (2002) ACAMS, HSPD-7, and other Initiatives For additional information view video at www.dhs.gov/acams
20. Prevention Assessments are completed…vulnerability issues have been addressed. The goal now is to apply your knowledge, understanding, and preparedness to preventing an act from occurring.
21. Prevention Seven Signs of Terrorist Activity Surveillance Elicitation Tests of Security Acquiring Supplies/Funding Suspicious People/Impersonation Dry Runs/Rehearsals Deployment of Assets
22. Terrorist Attack Cycle Target Selection Surveillance Final Target Selection Planning Final Surveillance Deploy Attack Team Attack
23. Target Selection Terrorist’s Goals Kill and/or Injure Cause overreaction by the government Harass, weaken or embarrass government Destroy Infrastructure Destroy facilities Instill fear Disrupt communications Discourage foreign investment Influence government decisions Satisfy a vengeance Destroy economy
24. Desirable Targets Transportation Economic Infrastructure Soft Targets Symbolic or “Public Message” Military Specific Individuals
25. Surveillance-Terrorists Seek Information- Existing security at the facility: Security force size Security’s normal duties Security measures (i.e. Searches) Reaction times and procedures to false alarms Security Equipment Patrol Routines Shift Changes Access control measures Uniforms and clothing worn by personnel Location of critical assets (fuel, water, power) Computer sites Schedules of vendors Photos, video recordings, etc
26. Final Target Selection Targets with greatest weaknesses and vulnerabilities Targets with possibility of greatest success.
27. Planning Phase Research and Intelligence Gathering Choosing method of attack Gathering supplies Designing-Building-Testing Device(s) Dry Runs
29. Final Surveillance Terrorists will look for the same items and routines that showed a particular facility to be vulnerable during the first surveillance phase They conduct a final surveillance to make sure nothing has changed in and around the facility during their planning phase.
30. Attack Cycle Deployment of Attack Team Terrorist have their weapons intact and are en-route to the attack site The Attack Terrorists have arrived at the location of the attack, the weapons of choice are in place, and the attack is carried out.
31. Lodging Industry Inherent Problems No vehicle checkpoints No security searches Occupants have free access Occupants have some right to privacy in their rooms Many of the behavioral signs for a criminal/terrorist may be typical for a hotel guest (i.e. bags, clothing, photos)
32. Lodging Industry What you can do Watch for suspicious vehicles Watch for highly unusual behavior Train employees to watch for suspicious behavior Instruct employees to watch for unusual activities taking place in guest rooms Practice your emergency plans Report suspicious behavior immediately
33. Other Threats Behavioral awareness is beneficial in stopping any criminal activity Robbery Theft Espionage Assault Cyber Attacks Very real concern in the U.S. for all entities Workplace violence Active Shooters
34. Technology-Techniques Technology Techniques Keep premises clean and orderly! Know your facility and what belongs there. Incorporate blast mitigation design Security (Armed vs. Unarmed) Challenging Unknown Visitors Sign-In Logs and ID Checks Vehicle Inspections Interview Techniques Behavioral Analysis Training Biometrics Card Access Detection Inst.-CBRNE Cameras/Surveillance/Lighting Alarms/Motion Sensors Cyber ware Security Doors X-ray/Magnetometers Vehicle Barriers Blast Mitigation Products CCTV
35. PreventionSummary Complete vulnerability assessments Minimize risks and vulnerabilities Have a security plan Practice and test the plan Reassess the plan and fine tune Train and conduct exercises. Continually educate employees
53. Response(Business) Vehicle Borne IEDs (VBIED) Indicators of a VBIED Sagging shocks, indicating heavy payload Odors, smoke, or fluids coming from vehicle Paperwork or plates do not match vehicle registration Vehicle appears to be abandoned Wires, switches, or other suspicious items observed inside of vehicle. Appears to be stolen Signs that it may be a cloned vehicle Items lying in vehicle that appear to be suspicious.
54. Response(Business) Business Response to VBIED Evacuate area immediately, allowing for blast hazards. Notify police immediately. Do not attempt to tow vehicle! Always keep Secondary Devices in mind!
55. Response(Business) Business response to a post-blast bombing incident. Evacuate Notify police and EMS immediately. Care for injured. Stay on phone with police dispatcher to keep LE/EMS updated. Keep employee roster/log book to manage personnel at scene.
56. Response (Business) Business Response to Bombing Scenes Secure the building, parking structure, and surrounding area until police arrive. Building maintenance, management, and security need to remain available to LE. Have communications system available for employees. Minimize media contact Point person to collect statements/documents Do not handle evidence! Security can attempt to keep streets open for arriving LE/EMS Attempt to minimize emotional distress in employees. Follow instructions from LE
57. Police Response Police and EMS will arrive on scene very quickly. The injured will be cared for by EMS, while LE secures the crime scene and searches for additional hazards. Once hazards are identified and eliminated, the crime scene will be evaluated and processed ASAP. Command Post(s) will be set up and an Incident Command System will be implemented to manage all agencies. LE will immediately begin investigative processes to maximize their chances of a successful prosecution. Your help will be needed!!!
58. Summary Prevention and response is everyone's responsibility. Conduct Risk and Vulnerability Assessment Harden security as much as possible Based on assessments, make a plan practice the plan, re-evaluate, make necessary changes Train and educate employees Contact your local LE officials for additional training and information.