320 likes | 333 Views
Join the expert-led seminar to understand evolving security needs in the face of emerging threats like terrorism. Explore risk assessment and response strategies in the context of national defense and public safety. Address vulnerabilities and impact factors to enhance preparedness and resilience. Delve into threat intelligence, trend analysis, and best practices for a secure future.
E N D
Homeland Security:Emerging Security Needs Casualty Actuaries in Reinsurance Special Interest Seminar: Terrorism September 13, 2004 New York, NY Asha M. George, DrPH Threats Division Manager Homeland Security Institute
“The increasing availability of relatively inexpensive cruise missiles and the capability to fabricate and introduce bio-toxins and chemical agents into the US means that rogue nations or transnational actors may be able to threaten our homeland” - Report of the National Defense Panel, 1997
Nuclear vs. Biological LethalityCongressional Office of Technology Assessment, 1993
Caught By Surprise • World Trade Center • Bombing of the Murrah Federal Building in Oklahoma • World Trade Center/Pentagon • Anthrax We may not be able to prevent events from occurring. We can at least keep ourselves from being surprised.
Understand the Threat Prevent Deter Prepare Detect Respond Recover Mitigate Partner with Others
Intelligence • Information collected • Put together with other information • Then all of it is analyzed • End product is what we call intelligence • In the homeland security context, Info1 is provided by state and local personnel Analysis [ Collect (Info1+Info2+…InfoX) ] = Intelligence
Awareness vs. Belief:Awareness Drops Out BELIEF AWARENESS ATTITUDE BEHAVIOR
Simple Equations to Characterize Vulnerabilities X Intentions X Capabilities = Threat Threat X Vulnerability X Asset Value = Risk
Threat Continues to Change • The enemy continues to find ways to get through our defenses and exploit our vulnerabilities. • Just as disease knows no borders, neither do crime, weather, and any number of other things that produce insecurity and terrorism. • Society is continuing to become more connected.
The single biggest threat to man’s continued dominance on the planet is the virus.” - Joshua Lederberg, PhD, Nobel laureate Electron micrograph of Ebola virus
What We Should Expect • Changes in terrorist tactics, methods and operational activities occur naturally – if only because vulnerabilities, risks, technological abilities, etc., of targets are also changing • Lack of wherewithal regarding and interest in conventional operations – if only because they require huge resources and will certainly result in military response and other types of retaliation • Unexpected, innovative, non-traditional and broadly applicable methods
Characteristics • Small-scale high-impact operations • As with everything else in society, terrorism drives towards greater efficiency and effectiveness, expending the least amount of resources to achieve the largest results • Unequal action taken to rectify societal inequality? Reaction to disproportionate power by using a weapon that wields disproportionate power itself?
Top Priority for Terrorism • Attack Fear + Chaos Civil Unrest Societal Breakdown • How? By: • Undermining the strengths of a target • Exploiting the weaknesses of a target • Maximizing their own advantage • Attaining control • Gaining freedom to take any action they please
Effect Multipliers • M1: Ability to disrupt electronic infrastructure • M2: Ability to generate fear • M3: Ability to utilize psychological operations • M4: Ability to prevent action, response, retaliation, etc. • M5: Ability to decrease initiative • M6: Ability to introduce weapons of mass destruction and/or related materials • M7: Ability to fight in environments that degrade capacity for military response and retaliation • MX: Ability to ______
Infinite array of vulnerabilities for society – Finite array of vulnerabilities for an organization Weakness in defense Weakness in preparedness Highly mobile population Enjoyment of congregation Population density and lack thereof Unprotected agricultural production areas Federal (as opposed to National) intelligence apparatus Lack of specific guidance to individuals Porous borders Inadequate transportation safety Lack of coordinated activities and databases Vulnerabilities
Disorganized infrastructure elements Squishy cyberspace Inability to communicate and work with other countries Science, tools and technology not matched against threats, risks and vulnerabilities Disarray of public health and other infrastructures Inability to address the truly difficult tasks (e.g. Select Agent Program) Holes in existing law Inability or lack of willingness to share information Split and heavily occupied military forces Increasing deficit Etc. Vulnerabilities (continued)
Impact of a Terrorist Attack Resources + Unexpected Methods + (Understanding + Exploitation)Vulnerabilities + Effect (M1+M2+M3+M4+M5+M6+M7 +…MX) = Impact
Identification of Atypical Trends • Ongoing observational data • Feed into successively broader surveillance and analysis systems • Information must be fed back as soon as possible • Surveillance needs to be more than routine
Basic Model for Trend Research Modality Y Trend Identification & Analysis Modality X Historical Analysis & Scanning
US Homeland Security Advisory System SEVERE Severe Risk of Terrorist Attacks HIGH High Risk of Terrorist Attacks ELEVATED Significant Risk of Terrorist Attacks GUARDED General Risk of Terrorist Attacks LOW Low Risk of Terrorist Attacks
View of Homeland Security NATIONAL SECURITY HOMELAND SECURITY PUBLIC SAFETY
View of Homeland Defense DEFENSE & DETERRENCE HOMELAND DEFENSE CONSEQUENCE MANAGEMENT SUPPORT
International Cooperation National Security Homeland Security U.S. INTERNATIONAL AGENDA Combating Terrorism Combating WMD
Space • Between stimulus and response, there is space. • In that space is power to choose our response. • In our response lies our growth and our freedom. - Stephen Covey