surveillance detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · identify...
Post on 15-May-2018
246 Views
Preview:
TRANSCRIPT
FOUO
FOUO
Mr. Richard kirchner, jR.
chief, surveillance detection
Antiterrorism force protection directorate
Pentagon Force Protection Agency
u.s. Department of defense
20 September 2011
3
Proactively identify criminal & terrorist operations
•Reduce the amount of people deployed in security
•Reduce the potential for terrorist or criminal activity
•Reduce operational deficiencies by focusing on threat vs. risk
•Enhance the capabilities of your security technology
•Enhance the security image of the organization
Would you like to…
Exploiting the Terrorist’s Greatest Vulnerability
4
Perimeter Security / Target Hardening
Access Control
Incident Response
Background
Historical Security Focus
DHS Has Invested $30B+
Physical Security
First Responders
Impact
Improved Damage Mitigation Profile
More Efficient Response
5
Results of Focusing on Physical Security
6
7
8
9
10
Khobar Towers Tanzania
Mumbai
11
Khobar Towers
Casing began 18-21 months before the attack
3-person team – 40 occasions
Vehicle sighted on ten separate occasions
Several other targets also cased
19 killed – 372 wounded
12
Terrorist Surveillance in the US
Al Qaeda surveillance operations:
Prudential Financial Center
NYSE, Citigroup Headquarters
IMF, and World Bank
More than 100 photos of the Prudential Center
Details of site security measures and ways to defeat them
Types of badges worn by employees
Dossiers on individual security guards
13
Mumbai
Casing began at least 16 months prior to attack
Attack team had never been in the city
179 killed – 300+ wounded
14
Unsuccessful (Terrorist)
Fort Dix (NJ) May 2007
15
Daniel Patrick Boyd, Hysen Sherifi, Mohammad Omar Aly Hassan, Ziyad Yaghi, Zakariya Boyd, Dylan Boyd & Anes Subasic, arrested and charged with conducting surveillance on Quantico
Marine Base and planning to attack US military members
Unsuccessful (Terrorist)
Marine Corps Base Quantico (VA) July 2009
16
PREVENTION vs. MITIGATION
Physical Security Improvements Are Not Sufficient
Our Focus Must Equally Be:
17
Every successful terrorist assault
(and many criminal acts)
have been preceded by extensive
surveillance, reconnaissance, and logistics activity
We Know:
Attack Prevention
18
WHO HAS THE WILLINGNESS AND CAPABILITY TO ATTACK US?
19
Suspicious Activity?
20
Suspicious Activity?
21
MY Building
22
23
Red Shirt w/ sunglasses…
24
Foreign national Army Major
25
Attack
Cycle
26
The Intelligence Gathering Process
Exploit This Vulnerability
Identify
Gather
Collate
Share
Analyze
To IdentifyPatterns of Behavior Indicative of Pre-Attack Surveillance
Terrorist’s Greatest Vulnerability
Suspicious Activity
Reports
27
Understand Surveillance
Know The Terrorist Operational Planning Cycle
Identify Surveillance Vulnerabilities / Zones
Improve Observational Awareness Skills
Effectively Employ Technology
Methodology
28
Basic Objectives of Surveillance
• Collect Intelligence
• Avoid Detection
29
Identify facility vulnerabilities and surveillance targets
Identify locations from which surveillance can be undertaken
[RED ZONES]
Identify and describe electronic security measures
(number, location, type and coverage of cameras)
Document security procedures
Study security force
(size, gender, ethnicity, locations, dress, weapons ,competency)
Determine First Responder response times, locations
Specific Surveillance Objectives
30
POTENTIAL VEHICLE OBSERVATION POINTS
(FIXED, FOOT & VEHICULAR)
Cafe Taxi
Stand
Deli Parking
12
3
4
5
78
9
11
12
1415
10 6
13N
Building
Signage
Parking
31
OBSERVATION POINTS
N
Main Access
Road
3
54
1 2
67
OP 1
OP4/7
OP 5
OP 6
OP 3
OP 4OP 2
32
SURVEILLANCE VULNERABILITIES
N
Main Access
Road
3
54
1 2
67
OP 1
OP4/7
OP 5
OP 6
OP 3
OP 4OP 2
33
0 – Compound1 – Church2 – Residence #13 – Residence #24 – Overpass
35
Compound
Possible
Surveillance
36
Compound
Possible
Surveillance
37
Compound
Possible
Surveillance
38
Basic Training
Improve Observational Awareness
Consider Surrounding Environments
Objectives
Techniques
Methodologies
Pay Careful Attention to Surveillance Zones
Understand Surveillance
39
Counterintelligence Training
Counterintelligence fundamentals
FIS Operations and Methodology
Demeanor in a hostile real-world environment
Changing clothes in the field
Cover Legend (Cover for Status)
Elicitation/Counter-Elicitation
Foreign Nat’l and Cultural Awareness
Overview of modern day TSCM threats
Advanced covert camera & video usage
Elements & signatures of espionage tradecraft
Suicide Bomber/Behavioral Pattern Recognition (BPR) Training
Physiological and psychological signs associated with suicide bombers
Critical differences between combating terrorism and criminal acts
Design, construction, concealment and delivery of Type I, II, III improvised explosives devices (IED)
Legally defensible suicide bomber identification techniques
Case analysis related to studies on modern suicide bombing events
Instruction/perform physical techniques, interception tactics and other practical skills required to effectively counter suicide bombing tactics
Instruction/perform physical techniques and firearms skills associated with deadly-force and non-deadly force encounters (interceptions)
Instruction/perform decision making under stress, firearms/Simunition training specific to unconfirmed and confirmed suicide bomber encounters in proximity to queued individuals and unstructured crowds.
Stress Reflex Indicators (SRI)
Physiological/psychological manifestations associated with BPR/SRI
Articulation of behaviors/indicators and reasonable suspicion
Proactive application of BPR/SRI techniques to detect imminent suicide bombing attacks
Role and limitations of visual analysis
Facial analysis, expressions and micro-behaviors
Emotional speech analysis
Gesture analysis
General expressivity
Sensory parameter dependent physiological responses
Surveillance Detection Training
SD Operations Instruction & OJT
Types of surveillance
Identifying Hostile Surveillance Locations
“Reverse Engineering” what a Hostile Surveillant can see and its value
Window matrices
Surveillance Point diagrams
Neutralization and exploitation
Establishing baseline activity
Target Analysis
Surveillance indicators and anomalies
Observation and reporting skills
Surveillance Detection Routes
Surveillance Case studies
SD Team operations
40
Multifaceted Functionality
• Detect Hostile Surveillance
• Detect Countersurveillance activities
• Support Counterintelligence Functions
• Support Executive Protection
• Provide Protective Intelligence
• Conduct Awareness Training
• Assist in Vulnerability Assessments
• Provide overwatch Special Unit activities
• Support to Incident Command
• Tactically Engage Extreme Threats
41
Employ Technology
to
Exploit Terrorist Vulnerabilities
42
Technology Should:
• Capture Events Quickly
Location, Time, Activity, Description, Image (no PII dependence)
• Establish Institutional Memory
• Structure Information to Facilitate Analysis
• Identify Patterns of Behavior Indicative of Pre-Attack Surveillance
• Provide Immediate Feedback on Suspicious Individuals, Vehicles, etc.
• Automate Threat Information Sharing Across Regions and Industries
• Enable Ad Hoc Queries Across the Data base
Collect, collate, and analyze suspicious activity reports to detect
patterns indicative of pre-attack surveillance
43
“…premier Surveillance Detection Program in DoD.”
- 2010 Joint Services Vulnerability Assessment (JSIVA) Team
Best Practices
44
Questions?
Surveillance DetectionSemper Vigilans - Amo Haud Alius
Always Vigilant – Like No Other
Rik Kirchner
Surveillance Detection Division
top related