1 / 51

F/SUPT HERBERT B CEZAR D i r e c t o r Fire National Training Institute (FNTI)

TERRORISM. F/SUPT HERBERT B CEZAR D i r e c t o r Fire National Training Institute (FNTI). TERRORISM. It is the premeditated, threatened, actual use of violence, force, or by any other means of destruction perpetrated against person/s, property/ies, or the environment.

meghan
Download Presentation

F/SUPT HERBERT B CEZAR D i r e c t o r Fire National Training Institute (FNTI)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TERRORISM F/SUPT HERBERT B CEZAR D i r e c t o r Fire National Training Institute (FNTI)

  2. TERRORISM It is the premeditated, threatened, actual use of violence, force, or by any other means of destruction perpetrated against person/s, property/ies, or the environment. It is committed by any person or group of persons, whether natural or juridical, who, with intent to create or sow danger, panic, fear or chaos to the general public or a group of persons or particular person, or to coerce or intimidate the government to do or to abstain from doing an act.

  3. ACTS OF TERRORISM Threatening or causing death or serious bodily harm (on person or persons); Threatening or causing serious risk to health or safely of (the public or any segment of the public; Threatening or causing substantial damage or wanton destruction or resorting to arson on critical infrastructure or property, public or private; Threatening or causing serious interference with or serious disruption of an essential service, facility or system, whether public or private, other than a result of lawful advocacy, protest, dissent or stoppage of work; Hijacking or threatening to hijack any kind of aircraft, electric or railroad train, locomotive, passenger bus or oilier means of mass transportation, or public conveyance, or piracy of ship or sea vessel;

  4. ACTS OF TERRORISM Taking or threatening to kidnap or deprive any person of his/her liberty; Assassinating or threatening to assassinate, or kidnapping or threatening to kidnap the President or the Vice President of the Philippines, the President of the Senate, the Speaker of the Mouse of Representatives or the Chief Justice of the Supreme Court; Killing or violently attacking an internationally protected person or depriving the liberty of such person in violation of the Convention on the Protection and Punishment of Crimes Against Internationally Protected Persons, including Diplomatic Agents, and oilier international agreements;

  5. ACTS OF TERRORISM Attacking or threatening to attack the cyberspace, by destroying the actual machinery of the information and communication infrastructure, disrupting the information technology underlying the internet, government or private networks or systems, or committing any unlawful act against networks, servers, computers or other information and communication systems; Wilfully destroying the natural resources in land, water and air, such as    forests or marine and mineral resources, or intentionally causing oil or toxic spillages, or other similar acts of destruction against the environment that threatens ecological security;

  6. ACTS OF TERRORISM Unlawfully manufacturing, processing, selling, acquiring, possessing, using, diverting, supplying or transporting chemical, biological, radiological or nuclear agents, or equipment and instruments used in their production, distribution, release or spread that would endanger directly or indirectly the safety of one or more individuals, or to cause mass destruction or great damage to property; or Unlawfully manufacturing, selling, acquiring, supplying, disposing, using or possessing explosives, bombs, grenades, projectiles, devices or other lethal weapons, or substances or machinery used or intended to be used for the manufacture of explosives in furtherance of, or incident to, or in connection with an act of terrorism defined herein.

  7. The Faces of Terrorism

  8. BALI BOMBING October 2002

  9. WORLD TRADE CENTER September 2001

  10. 2005 Valentine’s Day Bombings“Mini-9/11 in the Philippines” Bus exploded into flames at least 3 persons killed Blast hit outside Gaisano Mall at least 3 persons killed Bomb detonated at a bus terminal 1 person killed Makati City GENSAN City Davao City

  11. SUPERFERRY14 BOMBING February 2004 “the WORLD's fourth deadliest terrorist strike since September 11, 2001, and ASIA's worst since the Bali bombings of October 2002”. -TIME MAGAZINE AUGUST 2004

  12. CURRENT SITUATION LIST OF BOMBING ACTIVITIES THAT TRANSPIRED IN 2006

  13. Recent Bombings across the Globe July 11, 2006 Mumbai, India eight coordinated explosions during the evening rush hour 190+ killed and hundreds injured. July 10, 2006 Sao Paulo, Brazil bomb Injures exploded inside a subway train More than 10 injured July 5, 2006 Yakhroma, Russia bomb exploded at a Muslim prayer house no casualties reported June 26, 2006 Suicide Attack in Colombo, Sri Lanka A top Sri Lankan general was killed along with several others June 24, 2006 Bangkok, Thailand two bombs exploded near the Thai Rak Thai (TRT) party headquarters

  14. Bombings in the Philippines June 23, 2006 Sharif Aguak, Mindanao bomb exploded near a public market 5+ people killed and 10 injured June 20, 2006 an explosion that occurred on a Makati street One injured June 13, 2006 pillbox bomb exploded inside Camp Bagong Diwa no reports of injuries a SWAT van sustained damage June 11, 2006 Lipa, Batangas grenade inside a bag exploded outside of a market at least nine people injured June 11, 2006 Commonwealth Avenue, Quezon City homemade bomb exploded near a parked bus no reports of injuries; bus sustained significant damage

  15. Bombings in the Philippines June 11, 2006 Plaza Lawton, Manila explosion hit a police station June 9, 2006 Pampanga grenade attack on the residence of a PGMA supporter June 6, 2006 Makati City improvised explosive device detonated outside the Great Pacific Life Bldg no reports of injuries March 29, 2006 Digos City, Davao del Sur bomb exploded inside a bus at least 17 people were injured the bus and three nearby vehicles sustained damages

  16. Bombings in the Philippines March 27, 2006 a bomb exploded in Jolo, Sulu 9 people killed, 20 others injured February 20, 2006 an explosion occurred inside the gates of Malacañang, Manila no reports of damage or injuries February 18, 2006 Jolo, Sulu a bomb exploded at a karaoke bar located several meters from an army base where US soldiers are participating in joint exercises with the AFP 1 person killed; 28 others injured January 30, 2006 Ermita, Manila a small improvised explosive device detonated in front of the Court of Appeals Bldg no reports of damage or injuries

  17. THREAT Any inimical act and/or unwanted event, which may bring about adverse results. Types of Threats • NATURAL Typhoon Volcanic Eruption Earthquake Flood Erosion • MANMADE TERRORISM Sabotage Technical or Financial Fraud Coup d’ Etat/Rebellion Labor Strike War • TECHNOLOGICAL Plant Breakdown Breakdown or Failure of Protective Devices Environmental Hazards

  18. Subjects of Threats • Nation • Person • Organization • Infrastructures • Community • Key Assets • Operations

  19. Areas of Threats • Transport Terminals • Public Conveyances • Telecom Facility • Power Facilities • Water Supply Facilities • Government Buildings • Movie Houses & Malls • Business Facilities • Medical/Health Facilities • Emergency Service Facilities • Road Infrastructures • Religious Institutions • Educational Institutions • Markets

  20. A condition used to describe the openness or weakness of a subject of a threat. VULNERABILITY The condition of vulnerability is directly influenced by the strength or weaknesses of a security or protective program. The chance that a given threat will occur and bring about adverse consequences. PROBABILITY

  21. CRITICALITY • Importance of a subject of a threat as defined by its nature. • Importance is directed towards: a. The subject of a threat itself b. Community and citizenry c. Any or all aspects of National Security

  22. Tangible and intangible outcome or consequence of a threat occurrence, such as loss, injury, disadvantage or gain. IMPACT The product of threat probability and the sum of impact of a threat occurrence that can be inflicted against a target of an identified threat. IMPACT SEVERITY

  23. RISK ANALYSIS: A Tool of Risk Management

  24. RISK ANALYSIS The systematic and logical study of a given threat, its likelihood of occurrence and the severity of its impact, purposely for the formulation and implementation of an effective and efficient security program to detect, control or prevent losses.

  25. the probability that an undesirable event or threat may actually take place and inflict adverse consequences, including the failure to achieve goals and objectives. RISK One is at RISK when: there is a threat the threat is probable to occur consequences if threat occurs

  26. STEPS IN RISK ANALYSIS MEASUREMENT OF PROBABILITY OF THREAT OCCURENCE MEASUREMENT OF SEVERITY OF IMPACT 4TH STEP MEASUREMENT OF VULNERABILITY 3RD STEP THREAT IDENTIFICATION 2ND STEP 1ST STEP

  27. The 1st Step of Risk Analysis THREAT IDENTIFICATION involves the identification and profiling of a threat.

  28. Who offers the threat? Why the threat? Objectives of the source of threat? Likely specific targets? Modus Operandi? PROFILING A THREAT Helps in designing an effective and efficient security or protective program. THREAT

  29. are specific conditions that identify a threat. Also, they directly or indirectly influence the potential of a threat to exist or be present. THREAT FACTORS • Criticality or Nature of the Subject of Threat • Internal & External Environment • Historical Incidents/Events

  30. Nature & Criticality of Facility THREAT FACTOR: • Operational Significance • Financial or Business Significance • Security Classification • Work or Input-Output processes and sensitive areas • Critical infrastructures and key assets (plus costs) • Financial Status and Financial Operations • Implications to national security, economy, politics, etc.

  31. Environment THREAT FACTOR: INTERNAL EXTERNAL • Politico-socio-economic situations • Geography, topography, etc • Demography • Presence of PNP, AFP and Emergency Response Agencies and their capabilities • Presence of sources of threats in the area • Global Situation • Structural Design • Landscaping • Facility Occupants • Facility Contents • Security Personnel & their capabilities • Presence of sources of threats inside the facility • Organization

  32. Internal Incidents Security Dept Other Depts Historical Event External Incidents Government Private • Near-miss events • Actual events Historical Event THREAT FACTOR:

  33. RATING THREAT FACTORS

  34. The 2nd Step of Risk Analysis MEASUREMENT OF VULNERABILITY involves the identification and measurement of the weaknesses of the existing security or protective program of a subject of a threat, as against the strength of the same security or protective program. .

  35. Increases probability of threat occurrence Reduces probability of threat occurrence Why Measure Vulnerability? Allows risk owners to know the strength of their existing Security Program, what needs to be corrected and what more are necessary to be put in place in defense against an identified threat. Vulnerability directly influences the probability of a threat to actually take place. WEAK SECURITY STRONG SECURITY

  36. are specific security conditions that weakens or strengthens the security/protective program of a target of threat. VULNERABILITY FACTORS absence of security or protective measures inadequacy of security or protective measures defective security or protective measures

  37. RATING VULNERABILITY FACTORS to empirically estimate the vulnerability of a target of threat.

  38. The 3rd Step of Risk Analysis MEASUREMENT OF PROBABILITY OF THREAT OCCURRENCE The probability that an identified threat is going to actually take place is measured using empirical parameters and tool.

  39. specific conditions that influence the probable occurrence of an identified threat. PROBABILITY FACTORS Threat Factors (Threat Potential) Vulnerability Factors

  40. Probability (Empirical) Formula

  41. Empirical Probability Rating

  42. The 4th Step of Risk Analysis MEASUREMENT OF SEVERITY OF IMPACT The possible impact of a threat occurrence and their severity are identified and measured.

  43. GENERAL IMPACT Failure to achieve organizational goals & objectives Loss of lives Destruction or loss of infrastructures & key assets Destruction, disruption or loss of systems/operations Income losses Loss of information and competitive edge Loss of image, goodwill and reputation Adverse implications to all or any aspects of National Security

  44. OTHER IMPACTS THAT NEEDTO BE CONSIDERED Geographic dispersion of potential damages Temporal extension of potential damages Requirements of restoring the situation to the state before the damages occurred (i.e., reforestation and detoxification of water) Violation of individual, social or cultural interests and values generating social conflicts and psychological reactions from those who feel inflicted by the risk consequences systems/operations

  45. PUTTING VALUE TO IMPACT Lives lost & Cost Downtime period & cost Lost income Replacement Cost Restoration Cost Cost of property destroyed Quantitative Reputation Goodwill Patronage loss Morale loss Effects to others Qualitative

  46. Impact Severity Measurement Formula

  47. Rating Threat Impact

  48. Threat Potential Rating Vulnerability Rating Impact Impact Severity 8.00 8.00 4.70 3.00 Level: HIGH Level: HIGH Level: FATAL Level: MODERATE Threat Probability 0.60 Threat Level: MODERATE TERRORIST ATTACK End Result of Risk Analysis

  49. In a complex and rapidly changing world, the day can instantly turn from friendly to hostile in a least expected time and with serious consequence … …thus, constantly “penetrating the fog of the future”, and managing the dangers beyond is a vital priority for all of us!

More Related