Long Island Import-Export Association
Download
1 / 11

Long Island Import-Export Association - PowerPoint PPT Presentation


  • 162 Views
  • Updated On :

Long Island Import-Export Association. Surveillance Detection Briefing for Commercial Infrastructure Operators March 18, 2010. Presenter. Police Officer Glenn Neuman Homeland Security and Counter Terrorism Bureau Nassau County Police Department.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Long Island Import-Export Association' - urvi


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Slide1 l.jpg

Long Island Import-Export Association

Surveillance Detection Briefing for Commercial Infrastructure Operators

March 18, 2010


Slide2 l.jpg

Presenter

Police Officer Glenn Neuman

Homeland Security and Counter Terrorism Bureau

Nassau County Police Department


Slide3 l.jpg

U.S. Department of Homeland Security’s training course “Counter Surveillance for Critical Infrastructure and Key Resources” tells us that security measures can be defeated, and stresses that additional measures should be employed.

Introduction


Facility security l.jpg
Facility “Counter Surveillance for Critical Infrastructure and Key Resources” tells us that security measures can be defeated, and stresses that additional measures should be employed.Security

  • Rings of Security:Physical-(Visible)- Walls, Fences, Gates, Guards & PlantingsProcedural- (Visible)- ID Checks, Entry Badges, Coded Entry, Alarm systems, CCT and CamerasInformational Ring-(Not Visible) Information about the threat that comes from the outside. Information that the opposition does not know you have.** More difficult to defeat **

Physical

Information

Technical


Slide5 l.jpg

Facility Vulnerability Analysis “Counter Surveillance for Critical Infrastructure and Key Resources” tells us that security measures can be defeated, and stresses that additional measures should be employed.

The FVA is a method used to determine facility vulnerability as well as predictable activity surrounding the facility.

It is important to view the facility and its weaknesses from the perspective of the attacker (from the outside in).

Observing the vulnerabilities from the “outside looking in” helps us to see the situation as the attackers would/will and could ultimately enable us to thwart their plans.


Slide6 l.jpg

Surveillance “Counter Surveillance for Critical Infrastructure and Key Resources” tells us that security measures can be defeated, and stresses that additional measures should be employed.Detection

Case studies have revealed that surveillance is the weakest link in the attack cycle. Very often, initial surveillance is poorly executed due to lack of discipline or training of the surveillance team.

Surveillance Detection is an ongoing process by which we focus various assts on the identified Red Zone area to detect surveillance in those are.


Slide7 l.jpg

Reporting “Counter Surveillance for Critical Infrastructure and Key Resources” tells us that security measures can be defeated, and stresses that additional measures should be employed.

The importance of timely reporting cannot be overstated. It is important so that security and/or Law Enforcement can use the information and act in a timely fashion.

WHO is doing WHAT?

WHEN did they do it?

WHERE did they do it from?

HOW did they do it?

WHY were they doing what they did?


Slide8 l.jpg

Observation “Counter Surveillance for Critical Infrastructure and Key Resources” tells us that security measures can be defeated, and stresses that additional measures should be employed.

It is more than seeing; it is knowing what you see and comprehending its significance.

  • Identify distinguishing physical characteristics

  • Identify changing physical features

  • Identify changing details of appearance or behavior

  • Recall factors the affect observation skills and recall.

  • Practice method for improving observation skills an memory


The four d s of security l.jpg

DETER “Counter Surveillance for Critical Infrastructure and Key Resources” tells us that security measures can be defeated, and stresses that additional measures should be employed. – You want to deter the “Bad” guys from having any interest in your business or location. This can be done variety of ways ranging from physical security barriers to something as simple as keeping your information secure.

DENY – If they are interested, you want to deny them access. And that can be done with alarm systems, security guards, etc.

DETECT – If they do gain access, you want to detect them ASAP. This can be done with things like alarms, cameras, etc,.

DELAY - If they gain access to the site and what they are looking for, you want the delay them from escaping. The longer they are at scene the more likely they are to be caught by security personnel or Law Enforcement

The Four D’s of Security


Useful forms l.jpg
Useful Forms “Counter Surveillance for Critical Infrastructure and Key Resources” tells us that security measures can be defeated, and stresses that additional measures should be employed.


Contact information l.jpg

If you have any further questions please feel free to contact our office at –

516-573-8440

Homeland Security and

Counter-Terrorism Bureau

Nassau County Police Department

Contact Information


ad