1 / 32

Homeland Security: Emerging Security Needs

Join the expert-led seminar to understand evolving security needs in the face of emerging threats like terrorism. Explore risk assessment and response strategies in the context of national defense and public safety. Address vulnerabilities and impact factors to enhance preparedness and resilience. Delve into threat intelligence, trend analysis, and best practices for a secure future.

lavine
Download Presentation

Homeland Security: Emerging Security Needs

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Homeland Security:Emerging Security Needs Casualty Actuaries in Reinsurance Special Interest Seminar: Terrorism September 13, 2004 New York, NY Asha M. George, DrPH Threats Division Manager Homeland Security Institute

  2. “The increasing availability of relatively inexpensive cruise missiles and the capability to fabricate and introduce bio-toxins and chemical agents into the US means that rogue nations or transnational actors may be able to threaten our homeland” - Report of the National Defense Panel, 1997

  3. Nuclear vs. Biological LethalityCongressional Office of Technology Assessment, 1993

  4. Caught By Surprise • World Trade Center • Bombing of the Murrah Federal Building in Oklahoma • World Trade Center/Pentagon • Anthrax We may not be able to prevent events from occurring. We can at least keep ourselves from being surprised.

  5. Understand the Threat Prevent Deter Prepare Detect Respond Recover Mitigate Partner with Others

  6. Intelligence • Information collected • Put together with other information • Then all of it is analyzed • End product is what we call intelligence • In the homeland security context, Info1 is provided by state and local personnel Analysis [ Collect (Info1+Info2+…InfoX) ] = Intelligence

  7. Awareness vs. Belief:Awareness Drops Out BELIEF AWARENESS ATTITUDE BEHAVIOR

  8. Simple Equations to Characterize Vulnerabilities X Intentions X Capabilities = Threat Threat X Vulnerability X Asset Value = Risk

  9. Threat Continues to Change • The enemy continues to find ways to get through our defenses and exploit our vulnerabilities. • Just as disease knows no borders, neither do crime, weather, and any number of other things that produce insecurity and terrorism. • Society is continuing to become more connected.

  10. The single biggest threat to man’s continued dominance on the planet is the virus.” - Joshua Lederberg, PhD, Nobel laureate Electron micrograph of Ebola virus

  11. Smallpox

  12. What We Should Expect • Changes in terrorist tactics, methods and operational activities occur naturally – if only because vulnerabilities, risks, technological abilities, etc., of targets are also changing • Lack of wherewithal regarding and interest in conventional operations – if only because they require huge resources and will certainly result in military response and other types of retaliation • Unexpected, innovative, non-traditional and broadly applicable methods

  13. Characteristics • Small-scale high-impact operations • As with everything else in society, terrorism drives towards greater efficiency and effectiveness, expending the least amount of resources to achieve the largest results • Unequal action taken to rectify societal inequality? Reaction to disproportionate power by using a weapon that wields disproportionate power itself?

  14. Top Priority for Terrorism • Attack  Fear + Chaos  Civil Unrest  Societal Breakdown • How? By: • Undermining the strengths of a target • Exploiting the weaknesses of a target • Maximizing their own advantage • Attaining control • Gaining freedom to take any action they please

  15. Effect Multipliers • M1: Ability to disrupt electronic infrastructure • M2: Ability to generate fear • M3: Ability to utilize psychological operations • M4: Ability to prevent action, response, retaliation, etc. • M5: Ability to decrease initiative • M6: Ability to introduce weapons of mass destruction and/or related materials • M7: Ability to fight in environments that degrade capacity for military response and retaliation • MX: Ability to ______

  16. Infinite array of vulnerabilities for society – Finite array of vulnerabilities for an organization Weakness in defense Weakness in preparedness Highly mobile population Enjoyment of congregation Population density and lack thereof Unprotected agricultural production areas Federal (as opposed to National) intelligence apparatus Lack of specific guidance to individuals Porous borders Inadequate transportation safety Lack of coordinated activities and databases Vulnerabilities

  17. Disorganized infrastructure elements Squishy cyberspace Inability to communicate and work with other countries Science, tools and technology not matched against threats, risks and vulnerabilities Disarray of public health and other infrastructures Inability to address the truly difficult tasks (e.g. Select Agent Program) Holes in existing law Inability or lack of willingness to share information Split and heavily occupied military forces Increasing deficit Etc. Vulnerabilities (continued)

  18. Impact of a Terrorist Attack Resources + Unexpected Methods + (Understanding + Exploitation)Vulnerabilities + Effect (M1+M2+M3+M4+M5+M6+M7 +…MX) = Impact

  19. Identification of Atypical Trends • Ongoing observational data • Feed into successively broader surveillance and analysis systems • Information must be fed back as soon as possible • Surveillance needs to be more than routine

  20. Basic Model for Trend Research Modality Y Trend Identification & Analysis Modality X Historical Analysis & Scanning

  21. US Homeland Security Advisory System SEVERE Severe Risk of Terrorist Attacks HIGH High Risk of Terrorist Attacks ELEVATED Significant Risk of Terrorist Attacks GUARDED General Risk of Terrorist Attacks LOW Low Risk of Terrorist Attacks

  22. View of Homeland Security NATIONAL SECURITY HOMELAND SECURITY PUBLIC SAFETY

  23. View of Homeland Defense DEFENSE & DETERRENCE HOMELAND DEFENSE CONSEQUENCE MANAGEMENT SUPPORT

  24. International Cooperation National Security Homeland Security U.S. INTERNATIONAL AGENDA Combating Terrorism Combating WMD

  25. Space • Between stimulus and response, there is space. • In that space is power to choose our response. • In our response lies our growth and our freedom. - Stephen Covey

More Related