1 / 7

Thinking Like A Terrorist: Technique for Teaching Adults Homeland Security

Thinking Like A Terrorist: Technique for Teaching Adults Homeland Security. Daniel C. Goodrich. Can you identify these items?. What are we trying to accomplish. Increase individual situational awareness

Download Presentation

Thinking Like A Terrorist: Technique for Teaching Adults Homeland Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Thinking Like A Terrorist:Technique for Teaching Adults Homeland Security Daniel C. Goodrich

  2. Can you identify these items?

  3. What are we trying to accomplish • Increase individual situational awareness • Develop skill sets for personnel in other disciplines who can apply their problem solving abilities to help improve security • Develop champions throughout institutions who can assist their organization’s security • Change people’s perspectives and behavior

  4. Current training strategy • Talk about threats in vague terms. “It’s all right out there on the internet on how to do it.” • Does not explain how a perpetrator goes through the planning, surveillance, accumulating resources, rehearsals, and execution • Offer little/no information on the other side’s limits of applying tactical knowledge. “Superman effect”

  5. Another way • Focus on how a perpetrator would carry out an attack • Look for the vulnerabilities in carrying out that attack • Treat the technology/tools/tactics as neutral • Introduce security as using the perpetrator’s thought process but in terms of how to slow down/recognize/compromise/deter the attack

  6. Examples of Neutral Items • Similarities between alarm systems and switches for bombs • Sabotage instructions written for resistance groups by state actors • Review of “softer” groups (ELF and ALF) material available on the internet • Law enforcement training materials and memos • Reading “backwards”

  7. Questions? Daniel C Goodrich MPA, CEM Research Associate Mineta Transportation Institute rule308oes@yahoo.com 408/807-0930

More Related