1 / 51

Part III

Part III. Douglas M. McGaughey, CPP, CAS www.29-ten.com. Recap of Parts I and II. LEGAL SUPPORTER. LEGAL SUPPORTER. ILLEGAL/LOGISTICAL SUPPORTER. ILLEGAL/LOGISTICAL SUPPORTER. MILITANT / WEEKEND WARRIOR. MILITANT / WEEKEND WARRIOR. HARDCORE TERRORIST. HARDCORE TERRORIST.

siyamak
Download Presentation

Part III

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Part III Douglas M. McGaughey, CPP, CAS www.29-ten.com

  2. Recap of Parts I and II

  3. LEGAL SUPPORTER LEGAL SUPPORTER ILLEGAL/LOGISTICAL SUPPORTER ILLEGAL/LOGISTICAL SUPPORTER MILITANT / WEEKEND WARRIOR MILITANT / WEEKEND WARRIOR HARDCORE TERRORIST HARDCORE TERRORIST Part I: Metamorphosis In Part I: Metamorphosis, we discussed the metamorphosis of a law abiding citizen to a hard-core Terrorist. We discussed the observables such as changes in attitude, clothing, associations. And we examined the “Trigger” effect, the “last straw” that pushed an individual over the edge. Douglas M. McGaughey, CPP, CAS www.29-ten.com

  4. There are Many Causes of Terrorism Narcotics, Environment (ELF), Save the Whales, Save-the-Planet, Animals (ALF) Independence, Education, Fur Geo-political issues, Ethnicity, Religious beliefs, Pro-choice, Pro-life, White Supremacists, Nigerian oil, Anti-war, Poverty Terrorism IS NOT just about Radical Islamic beliefs, and terrorism does not just affect militaries and governments – Terrorism affects EVERYONE Douglas M. McGaughey, CPP , CAS www.29-ten.com

  5. The Bottom Line Under the right circumstances Under the Right Type of Pressure If You Believe in Your Cause Almost Any One Can Become a Terrorist Douglas M. McGaughey, CPP, CAS www.29-ten.com

  6. THE ACT ! Part II: Method MEDIA & PUBLICITY MEDIA & PUBLICITY CURRENT SITUATION DECISION TIME AFTER ACTION REVIEWS THE TERRORIST CYCLE In Part II: Method, we looked at the 13 phases of a terrorist incident. We examined why one target may be chosen over another We looked at the assessment of targets We discussed “the Act”, and that it doesn’t always have to take lives to send a message Lastly, we discussed the role of the media and publicity in the terrorist’s operations. PLAN DEVELOPMENT ESCAPE & EVASION INITIAL TARGET SELECTIONS ON/OFF-SITE TARGET RESEARCH FINAL TARGET SELECTION(S) MOVEMENT TO TARGET WAIT LOGISTICS SUPPORT WEAPON ASSEMBLY MEDIA & PUBLICITY MEDIA & PUBLICITY Douglas M. McGaughey, CPP , CAS www.29-ten.com

  7. Fact: Terrorism IS “Front Page” News Terrorism, Like War, is Propaganda It’s not how you say it - - it’s who says it. “We do not talk to say something, but to attain a certain effect.” “ Think of the press as a great keyboard on which the government can play.” Joseph Goebbels Douglas M. McGaughey, CPP, CAS, CI Special Agent (USA Ret.) www.29-ten.com

  8. TERRORISM IS A PUBLICITY BATTLE FOR THE VIEWING AUDIENCE WHATEVER SIDE THE AUDIENCE BACKS WINS !!! Douglas M. McGaughey, CPP, CAS, www.29-ten.com

  9. Part III: Mitigation Mitigating Your Risks • It’s Risk Mitigation - - Not Risk Avoidance • ypes of Targets - - Which One Are You • Liaison Operations – You Are Who You Know • Understanding the Threat • Defensible Space - - You Can’t Control Everything • Thorough Randomness - - A Roll of the Dice • CPTED – Use The Environment to Your Advantage • Open Source Intelligence • Conclusions Douglas M. McGaughey, CPP, CAS www.29-ten.com

  10. Remember - It’s Risk Mitigation - Not Risk Avoidance • An organization does not have unlimited funds or manpower to ensure its safety and security 100% of the time • Organizations need to focus on specific threats and develop appropriate countermeasures to address these in order of probability • What threat they address and when they employ offensive measures and defensive countermeasures will be the basis of mitigating those risks Recent statistics indicate that American business interests have been targeted more frequently than those of the Federal Government. ~ U.S. Department of State This means that a contractor may be more susceptible to harm than a Government employee. Douglas M. McGaughey, CPP, CAS www.29-ten.com

  11. To Mitigate the Threat, First You Have to Know the Enemy • Understand the terrorist’s motivation • Understand their strengths and weaknesses • Understand their Social Networks • Understand their sources of financial aide • Understand their logistics procurement process • Understand how they recruit • Understand their communications channels Douglas M. McGaughey, CPP, CAS www.29-ten.com

  12. “If you know the enemy and know yourself, your victory will not stand in doubt" ~ Sun Tzu

  13. To Know the Enemy –You Must Liaise A good contact can warn you prior to the terrorist act. Liaison is about obtaining AND sharing information Liaison can be cultural, religious, business, political, security etc… A good liaison operation will ensure you are the first to know, instead of the last. Liaison endears you to your partner; you both have something to gain, and lose from the relationship In liaison, as Reagan said, “Trust, but verify.” Douglas M. McGaughey, CPP, CAS www.29-ten.com

  14. Liaise with Everyone!! Don’t Just Stop at the Police ASIS Federal Marshalls DHS Private Security Organizations Social Media Networks Neighborhood Watch The terrorist, like the common criminal starts small, usually within the local communities and then expands their operations from this secure environment. Most often it is going to be the local beat cop, or small business owner who notices these events and reports them Cultivating these sources will benefit you and your organization - give you forewarning - and reduce your risk Local/State LEA DOD Travel Agencies General Public Consulates and Embassies Local Businesses ODNI FBI Global NGO Organizations Host Nation LEA DEA Local/City Government Religious Organizations Taxi Operations Douglas M. McGaughey, CPP, CAS www.29-ten.com

  15. Once You Understand the Enemy, You have to Understand What Type of Target your Are • Strategic Value Target: Long term impact, executive leadership, strategic centers, national command centers • High Payoff: Immediate impact to energy and commerce • High Value: Degrade target’s ability to respond militarily or to sustain itself economically • Low Value: Contribute to fear and harassment of local society. • Tactical Value: Degrade local LEA ability to react and respond • Symbolic Value: Heighten public fear and includes monuments, public structures, government reps and diplomats • Ecological Value: Damage natural resources such as crops, natural resources and industries • You may be on multiple target lists • Revaluate your threats randomly, as they will change Douglas M. McGaughey, CPP, CAS www.29-ten.com

  16. Remember, You May Be a Secondary Target Know Your Environment • - Determine Why You Are a Target • What is “IT” that makes you a target • - Remember, you may be a secondary “Personality” Target • - Remember, you may be a secondary “Environmental” target • - Remember, you may be a secondary “Inhabitant” target • Remember, you may be a secondary “Arterial” target • Remember, you may be a secondary “IS” target Douglas M. McGaughey, CPP, CAS www.29-ten.com

  17. When Terrorists Assess Targets They Adhere to Rule Number 1 Rule Number 1: A Terrorist is like electricity - - All things being equal , they will take the path of least resistance, the insecure operation that will offer the best chance for success. Douglas M. McGaughey, CPP, CAS www.29-ten.com

  18. You DO NOT want to be the “PATH OF LEAST RESISTANCE” Douglas M. McGaughey, CPP, CAS www.29-ten.com

  19. All Things Being Equal, the “Path of Least Resistance” is An Exploitable Weakness • An exploitable weakness is an observable activity (a pattern), or absence of activity (failure to respond to alarms) • An exploitable weakness can occur on-site, off-site, in-transit , or electronically Douglas M. McGaughey, CPP, CAS www.29-ten.com

  20. To Mitigate the Threat You Need to Realize a Few Things Threat mitigation IS NOT single-faceted. Threat mitigation MUST involve ALL ASPECTS of your life. A robust security plan at work, does you no good, if you are attacked on your way to the office. Douglas M. McGaughey, CPP, CAS www.29-ten.com

  21. To Be Effective – Thorough Randomness MUST Cross ALL Activities • Travel to/from Defensible Spaces • Guard Force/Corporate Security Routes/Times • Visitor, Parcel and Personnel Item Screening • Parking Space/Visitor/VIP/Emergency • Emergency Evacuation Routes • Emergency Evacuation Areas • Logistics Supply Routes/Times • Business Meetings Times/Locations • Corporate Computer Security Reviews Douglas M. McGaughey, CPP, CAS www.29-ten.com

  22. You Mitigate the Threat byThinking Outside the Box! Douglas M. McGaughey, CPP, CAS www.29-ten.com

  23. You Mitigate the Threat by Educating Everyone Every new set of educated eyes and ears is another layer of security. I’m not just talking about the employees – I’m talking about the kids and spouses. Who knows better about something out of the ordinary better than a teenager, or a nosey spouse? Douglas M. McGaughey, CPP, CAS www.29-ten.com

  24. You Mitigate the Threat by Determining Your Defensible Space After you understand the threat the next step would be to evaluate the threat and establish your defenses. Like your education programs, your defenses should also be layered. And remember, you can’t protect everything, so you have to determine your “defensible space” Douglas M. McGaughey, CPP, CAS www.29-ten.com

  25. Defensible Space Is the ability to control access and monitor activities within a defined perimeter, such as a building, installation, residence, or facility - through the use of security personnel, electronic monitoring, access control, the environment and the overall workforce, whether soldiers or civilians. Douglas M. McGaughey, CPP, CAS www.29-ten.com

  26. Choosing Your Defensible Space • You can’t control everything – all of the time • You have to decide what is worth protecting • You have to develop layered barriers to mitigate the threat • These layers force a perpetrator to make conscious decisions • These decisions are observable • Choose your defensible spaces based on controllability and limit the numbers with access – whether tangible or intangible Douglas M. McGaughey, CPP, CAS www.29-ten.com

  27. You Mitigate the Threat to Your Defensible Space byLayering Your Security Layering your Education Layering your Defenses And - - Layering your Responses Douglas M. McGaughey, CPP, CAS www.29-ten.com

  28. You Layer Your Security Based on The Four “D’s” of Security Deterrence, Detection, Defense, Defeat Deterrence: Is when the terrorist perceives your operation’s security to be too great to overcome ; this is based on your offensive security projections Detection: Is your ability to note the presence of an intruder based on your layered offensive security and defensive countermeasures – with enough time to put in place a planned response Defense: Is your ability to delay, or prevent an intruder from achieving their goal Defeat: Is the compilation of Deterrence, Detection and a solid Defense Douglas M. McGaughey, CPP, CAS www.29-ten.com

  29. The Most Important of The Four “D’s” IS Deterrence Deterrence is a battle won in the minds of the enemy. ~Sun Tzu The greatest general is the one who can win without fighting. ~Sun Tzu Douglas M. McGaughey, CPP, CAS www.29-ten.com

  30. One VERY Important Facet of Deterrence IS Thorough Randomness As my maneuvering has no fixed form or predictable response, even the spy who has reached my inner sanctum will not be able to discover my true intent. Nor would the wiliest opponent to able counter-measures against me. ~ Sun Tzu Douglas M. McGaughey, CPP, CAS www.29-ten.com

  31. Thorough Randomness Exponentially decreases your risks While it escalates the threat to the terrorist Douglas M. McGaughey, CPP, CAS www.29-ten.com

  32. Thorough Randomness Eliminates Patterns Reduces the Terrorist’s “Luck Factor” By eliminating patterns – you mitigate your risks Byrecognizingpatterns – you mitigate your risks Douglas M. McGaughey, CPP, CAS www.29-ten.com

  33. So, Just What Is Thorough Randomness? Tho-rough: Complete with regard to every detail; not superficial or partial Ran-dom: Made, or occurring without definite aim, reason, or pattern Thorough Randomness is the sum of its parts – it is evaluating your total physical security program, breaking it down into its individual facets, and implementing one specific action, or a group of activities, applicable to everyone, on a completely random basis in terms of time and duration. Practicing Thorough Randomness can be as easy as – rolling the dice. Douglas M. McGaughey, CPP, CAS www.29-ten.com

  34. Applying Thorough Randomness to Your Defensible Space By expanding the variables of time and route into you daily activities You have increased your success factors exponentially; Rule Number 1: All things being equal, A terrorist is like electricity and will choose the path of least resistance The terrorist may choose another target… By varying your routes and times, you have forced the terrorist to adjust their targeting tactics and logistical resources such as manpower and equipment; To be successful the terrorist must get closer to your defensible space to observe your activities; If your security counter-measures are evaluated to pose a threat to the accomplishment of the mission - - As they come closer in, their presence and activities may become observable and thus make them vulnerable; This gives your security force the upper hand in pro-active counter-measures Douglas M. McGaughey, CPP, CAS www.29-ten.com

  35. To Be Effective – The Countermeasures Must Be Simple "Make everything as simple as possible, but not simpler." Douglas M. McGaughey, CPP, CAS www.29-ten.com

  36. Let’s look at employing Thorough Randomness in one aspect of your day - - travelling to/from your Defensible Spaces Douglas M. McGaughey, CPP, CAS www.29-ten.com

  37. One Thing That IS NOT Random - You Always Check Your Vehicle Before Getting on The Road Not noticing these things in your ‘defensible space” may result in your vehicle being in-operable in the terrorist’s “controllable space”. A simple thing like a few lose lug nuts can disable your vehicle ten minutes after departing a defensible space – leaving you vulnerable. Douglas M. McGaughey, CPP. CPP www.29-ten.com

  38. Once You Get on the Road Douglas M. McGaughey, CPP, CPP www.29-ten.com

  39. Forgotten Randomness Defensible Space Residence Consulate Departure Times: 0745 - 0800 Arrival Times: 0815 – 0830 X By utilizing the same vehicle, same route and travelling at the same time every day you throw away randomness and set up an exploitable pattern . A pattern will make you an easy target! Pattern Established X Look-Outs Observable Patterns Choke Points X Douglas M. McGaughey, CPP, CAS www.29-ten.com

  40. Employing Thorough Randomness To/From Your Defensible Spaces Defensible Space (Out to In) Residence Consulate Defense Measures: CCTV, Guards, Barriers, Badges, Vehicle/Parcel Checks, Uniforms, Vehicle Searches, Safe Rooms, Irregular Activities, Thorough Randomness, etc… But these measures cannot protect you outside your defensible spaces. Douglas M. McGaughey, CPP, CAS www.29-ten.com

  41. Employing Thorough Randomness To/From Your Defensible Spaces Defensible Space Residence Consulate Departure Times: 0745 - 0800 Arrival Times: 0815 – 0830 Travel Route – One Employing thorough randomness, utilizing multiple vehicles, varying routes and travelling at the different times every day you exponentially reduce your risks. 0645 - 0830 0745 - 0915 Multiple Douglas M. McGaughey, CPP, CAS www.29-ten.com

  42. Thorough Randomness Requires More of the Terrorist’s Logistics X X Defensible Space Residence Consulate Departure Times: 0745 - 0800 0645 - 0815 Arrival Times: 0815 – 0830 0715 - 0845 Travel Route – One Multiple Now to be successful, the Terrorist will have to put in place more personnel, keep them there for longer periods of time, use more support equipment, expand their logistics, all of which may draw unwanted attention to them. This simple random measure on your part will exponentially decrease your risk and force the terrorist to re-evaluate their plan. X Risk Mitigated X X X X X X X Douglas M. McGaughey, CPP, CAS www.29-ten.com

  43. Thorough Randomness And A Roll of the Dice For the guard force, a simple roll of a die can determine which route they take, or what time they depart. • Travel to/from Defensible Spaces • Guard Force/Corporate Security Routes/Times • Visitor, Parcel and Personnel Item Screening • Parking Space/Visitor/VIP/Emergency • Emergency Evacuation Routes • Emergency Evacuation Areas • Logistics Supply Routes/Times • Business Meetings Times/Locations • Corporate Computer Security Reviews For visitors, a simple role of the dice can determine which person you question and which briefcase you search. For logistics, a simple role of the dice can determine which route you take and the day of the week you travel. For emergencies, a simple role of the dice can determine which location your people assemble at after vacating the facility . Douglas M. McGaughey, CPP, CAS www.29-ten.com

  44. “Deception causes the deceived to take action that is otherwise not in their best interest. ” ~ SunTzu Douglas M. McGaughey, CPP, CAS www.29-ten.com

  45. Hey man, you ever heard of CPTED?

  46. CPTED • CPTED is Crime Prevention Through Environmental Design • CPTED strategies rely upon the ability to influence offender decisions that precede criminal/terrorist acts by affecting the built, social and administrative environment. • CPTED uses the environment, natural, or man-made to deter conscious behavior, or funnel the would-be perpetrator onto a specific route • CPTED augments other access control and physical security barriers and deterrents CPTED is a tool to be applied to your security arsenal, used in conjunction with other tools such as access control systems, CCTV, badging, thorough randomness and education to mitigate your risks. Douglas M. McGaughey, CPP, CAS www.29-ten.com

  47. CPTED Mitigates Your Risks ByAdvertising Your Territory Fencing and Signage: By using signage, and fencing, you force people to make a conscious decision to proceed into your territory; their decision to move ahead, is a trigger to implement your countermeasures. Red and Green Zone Channeling: Using natural and man-made barriers you can channel an audience in a direction you want (Green) and deter them from accessing locations you don’t (Red) Green and Hard-scaping: Using the natural environment such as thorn bushes, holly trees and cacti to act as a natural physical barrier; using the earth removed from a building foundation to erect a berm around a facility three feet high, will eliminate any threat of a perpetrator driving a vehicle into your building. Windows and Lighting: Well placed lights can illuminate paths for intended guests, while motion sensitive lights can illuminate intruders moving off a public area. Placing lighted windows or open spaces in long walls, or alcoves, can give the indication to a would be intruder that the area is under observation. CPTED is blatant and suggestive marking of your territory – any individual consciously deciding to enter your marked territory IS A THREAT! Douglas M. McGaughey, CPP, CAS www.29-ten.com

  48. Never Forget the Media and All That Open Source Intelligence The Internet can provide the criminal information on everything from information about key players and family, key up-coming events, over-head high-resolution images of your facility, major transportation routes and times, on-going operations, facility locations, addresses and phone numbers, legal and personnel issues, government contracts, building blueprints . . . Anything. The media is the best friend the adversary (terrorist/criminal) has. They provide free, corroborated raw intelligence, without strings. The adversary uses this information in gauging the public opinion, recruiting insiders, planning and perpetrating an act. You must constantly and randomly evaluate this open source information. Douglas M. McGaughey, CPP, CAS www.29-ten.com

  49. Once You Believe Have Covered Everything - Go “Red Team” Yourself! What is a Red Team? In government circles, Red Teaming is normally associated with assessing vulnerabilities and limitations of systems or structures. In exercises and war games, Red Teaming refers to the work performed to provide an adversarial perspective, especially when this perspective includes plausible tactics, techniques, and procedures (TTP) as well as realistic policy and doctrine. Red Teaming in a nutshell, is taking what you know about the adversary’s capabilities and tactics and using them against your activity in order to evaluate where your security is weak. Like any good plan, the Red Team assessment must be conducted by a competent team and updated regularly - - lives depend on its thoroughness and honesty. Douglas M. McGaughey, CPP, CPP www.29-ten.com

  50. The Complete Picture:Conclusions In mitigating your risks, remember that nothing can guarantee your safety. There are multiple activities you can undertake to mitigate your risks: Realize that you can only protect so much You Must Understand the Environment and Players You Must Understand Physical and Personnel Security You Must Vary your responses (drills, duress signals, fire, bomb, etc…) You Must Practice Thorough Randomness Lastly, have an exit plan. Douglas M. McGaughey, CPP, CAS www.29-ten.com

More Related