1 / 27

Introduction to Security

Introduction to Security. Chapter 13 Terrorism and Homeland Security Responsibilities. Security Professionals Responsibilities and Homeland Security. Knowing the enemy, who to look for and be vigilant Taking all possible steps to prevent a terrorist attack

tamber
Download Presentation

Introduction to Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Security Chapter 13 Terrorism and Homeland Security Responsibilities

  2. Security Professionals Responsibilities and Homeland Security • Knowing the enemy, who to look for and be vigilant • Taking all possible steps to prevent a terrorist attack • Preparing themselves and their agencies for an attack • Responding to an attack • Investigating the attack

  3. Terrorism Defined • According to the Terrorism Research Center: “the use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives”

  4. A Brief Chronology of Terrorism • 1789 - 1799: French Revolution revolutionaries used violence against enemies • 1930s – Terrorist acts used by Hitler, Mussolini and Stalin • Late 1880s – 1990s – KKK • 1978 – 1995 – Unabomber • Late 1980s – Animal Liberation Front

  5. 3 Elements of Terrorism • Criminal in Nature • Targets are typically symbolic • Terrorist actions are always aggressive and often violent

  6. A Brief Chronology of Terrorism • 1995 – Alfred P. Murrah Federal Building bombed by Timothy McVeigh & Terry Nichols • 1998 – 2 U.S. embassies in East Africa bombed • 10/12/2000 – USS Cole attacked in Yemen • 9/11/2001 – World Trade Center and Pentagon attacked by terrorists using hijacked airliners

  7. Who does what? • FBI – the lead agency for responding to acts of domestic terrorism • Federal Emergency Management Agency (FEMA) – the lead agency for consequence management after an attack

  8. USA PATRIOT Act • Singed into law by President Bush on October 26, 2001 • Gives police the unprecedented ability to seize, search, detain or eavesdrop in their pursuit of terrorists • Expands the FBI’s wiretapping and electronic surveillance authority • Establishes new punishments for possessing biological weapons

  9. Asymmetric War • A war in which a much weaker opponent takes on a stronger opponent by refusing to confront the stronger opponent head on • The weaker opponent chooses battles where the stronger one does not expect to be hit. • Police and government agencies are the most common targets.

  10. World Wide Terrorist Targets

  11. Classification of Terrorist Acts • Domestic Terrorism • International Terrorism

  12. Classification of Terrorist Acts • Domestic Terrorism • Based in this country • White supremacists • Black supremacists • Militia groups • Pro-life groups • Animal rights activists • Environmental extremists

  13. Classification of Terrorist Acts • International Terrorism • Foreign based – 3 categories • Foreign state sponsored (Iraq, Libya) • Formalized terrorist groups (al Qaeda, Hamas) • Loosely affiliated radical extremists – least organized, but largely unknown, leaving them free to travel

  14. Indicators of Terrorism • Following is a lengthy list of possible indicators of possible terrorists • It is important to note that these are only possible indicators and do not constitute proof in and of themselves. • They apply to both foreign and domestic terrorists.

  15. Indicators of Terrorism • Possession of fake/altered IDs • Multiple identification in different names • Possession of IDs with dramatically different photos of the same person • anti-American, anti-Jewish, or anti- “anything” material • Residence in several states in the last few years

  16. Indicators of Terrorism • Taken multiple trips out of the country or out of state in the last few years • Possession of videos/photos of public places and/or buildings • Taken flying lessons • Extreme interest in martial arts • Repeated use of public Internet access points to avoid tracing

  17. Indicators of Terrorism • Possession of phone cards • Possession of large amounts of cash • Renting first floor apartments (easy escape) • Using inexpensive motels (less security) • Don’t allow maids to clean the room when they are not present

  18. Indicators of Terrorism • No apparent means of legitimate income • Display of racial/terrorist symbols • Recent shaving of head and body hair

  19. Methods Used by Terrorists • Arson • Explosives • Bombs • Suspicious packages • Suicide bombers • Weapons of Mass Destruction • Biological agents • Chemical agents • Nuclear • Technology

  20. Likeliness of Methods Used by Terrorists

  21. Impact of Terrorist Weapons

  22. Preventing Terrorism • Security officers should stay alert for routine crimes/activities which may also be terrorism red flags • Watch for thefts/sales of certain chemicals: bleach, riot control sprays, chlorine, ammonium nitrate, etc.

  23. Preventing Terrorism National Infrastructure Protection Plan (NIPP) • Provides a collaborative, coordinated approach between the private sector and all facets of government • Includes agriculture and food, banking and finance, chemical, communications, dams, drinking water and water treatment, energy and other critical areas.

  24. Goals of the Department of Homeland Security • Increase our ability to keep bad people out of the country • Keep bad things out of the country • Protect our infrastructure better • Continue to build a response capability with modern computer tools • Promote Intelligence Gathering • Fusion centers

  25. Fusion Centers • 42 fusion centers are located throughout the country in 37 states. • These manage the flow of information and intelligence across all levels and sectors of government and private industry.

  26. Responding to Terrorist Attacks • First responders, most likely local police, firefighters and security officers are the first line of defense against terrorists. • These first responders must have interoperability in order to operate effectively.

  27. Concerns related to the War on Terrorism • Civil liberties may be jeopardized • People of Middle Eastern descent may be discriminated against or become victims of hate crimes.

More Related