1 / 15

Indicators of Terrorist Activity Handbook

Indicators of Terrorist Activity Handbook. US Coast Guard Headquarters Port Security Evaluation Division (CG-3PCP-4). Background & Context. Protecting High Consequence CI/KR has led to Higher Physical Security since 9/11

thy
Télécharger la présentation

Indicators of Terrorist Activity Handbook

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Indicators of Terrorist ActivityHandbook US Coast Guard Headquarters Port Security Evaluation Division (CG-3PCP-4)

  2. Background & Context • Protecting High Consequence CI/KR has led to Higher Physical Security since 9/11 • Heightened Physical Security means that Terrorists must plan more to overcome these security measures • Effective attack plans require information about the current security posture (they must know what they have to defeat in order to be successful) • Terrorist Training and Planning can take years to unfold • Port Security Terrorist Operations Assessments used Navy SEALs to provide the adversary perspective • Identified a growing requirement for better “outside the fence” awareness

  3. Physical Security Posture • Improved security attributed to: • MTSA • Industry Associations • LEA • Government Grants • Corporate Capital Investment • Security Officer Equipment & Training • Best Practices Dissemination

  4. Physical Security Posture • What to protect? • Critical Components • From what? • Plausible Threat Scenarios that result in high consequences • Review all threats (e.g., car/truck bomb, boat bomb, commercial vessels, swimmers, etc.) in context of consequence

  5. Threat Vectors • Assets that are not high-consequence themselves (e.g., pilot vessels, fuel barges, tugs, etc.), but whose routine access to critical assets might be exploited • Lower security procedures regarding the less critical asset may be overcome and used as a means to threaten the high consequence asset

  6. Physical Security Posture: How Protected? • What physical security measures are in place to address the plausible threats? • The Four ‘G’s • Guards, Gates, Guns, and Gadgets • Catchy phrase to address the many aspects of physical security to include: Barriers, Access Control, CCTV, IDS, PPE, Security Training, etc. • Role of facility, local, state and federal resources • Terrorists need “eyes on” the intended target to gather this type of information; it’s critical to a successful plan of attack

  7. Indicators of Terrorist Activity • Terrorist information gathering and planning, and our ability to impact their planning cycle, is addressed through the following topics: • Observation Points and Surveillance Areas • Staging Areas and Ingress Routes • Probing Security • Recognizing and Reporting Suspicious Activity

  8. Observation Points and Surveillance Areas • What are they? • Usually outside the perimeter • Provide view of critical components or key security measures • How are they determined or identified? • Elevation, concealment, access • What to do once they are identified? • Security Forces tend to focus inside the fence • Countermeasures can be identified

  9. Observation Points and Surveillance Areas

  10. Staging Areasand Ingress Routes • What are they? • Usually outside or approaching the perimeter • Provide access or route to critical components or key security measures to be defeated • How are they determined or identified? • Staging of vessel, vehicle, equipment, explosives • Ingress providing most effective access to CI/KR • What to do once they are identified? • Awareness programs at nearby potential staging areas • Monitor potential ingress routes and choke points to give early warning of attack in progress

  11. Staging Areasand Ingress Routes

  12. Probing Security • A higher security posture may require probing activity by terrorists to elicit a security response that can be measured or evaluated • May be related to site security, LEA, USCG, etc.

  13. Reporting of Suspicious Activity • How are suspicious activities recognized and reported? • What information is collected and reported? • How are reports investigated? • Is information collected in a database? Shared with other LEA? • Are programs that educate the public in use?

  14. Summary • Handbook Objectives • Define Current Security Posture • Identify Critical Components, Plausible Threats, Threat Vectors, Physical Security Measures, etc. • Identify Potential Indicators: • Observation Points or Surveillance Areas • Staging Areas and Ingress Routes • Probing Activities • Identify Awareness Programs and Training • Identify Actions to be Taken

  15. Next Steps • Training and guidance for Sector Port Security Specialists • Industry volunteers identified (5-10 sites) • Industry Handbook use coordinated with Port Security Specialist • Industry feedback consolidated by Sector and provided to HQ • Incorporate improvements and publish final version of Handbook

More Related