surveillance detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · identify...

43
1 Surveillance Detection

Upload: dangkiet

Post on 15-May-2018

246 views

Category:

Documents


17 download

TRANSCRIPT

Page 1: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

11

Surveillance Detection

Page 2: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

FOUO

FOUO

Mr. Richard kirchner, jR.

chief, surveillance detection

Antiterrorism force protection directorate

Pentagon Force Protection Agency

u.s. Department of defense

20 September 2011

Page 3: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

3

Proactively identify criminal & terrorist operations

•Reduce the amount of people deployed in security

•Reduce the potential for terrorist or criminal activity

•Reduce operational deficiencies by focusing on threat vs. risk

•Enhance the capabilities of your security technology

•Enhance the security image of the organization

Would you like to…

Exploiting the Terrorist’s Greatest Vulnerability

Page 4: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

4

Perimeter Security / Target Hardening

Access Control

Incident Response

Background

Historical Security Focus

DHS Has Invested $30B+

Physical Security

First Responders

Impact

Improved Damage Mitigation Profile

More Efficient Response

Page 5: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

5

Results of Focusing on Physical Security

Page 6: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

6

Page 7: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

7

Page 8: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

8

Page 9: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

9

Page 10: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

10

Khobar Towers Tanzania

Mumbai

Page 11: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

11

Khobar Towers

Casing began 18-21 months before the attack

3-person team – 40 occasions

Vehicle sighted on ten separate occasions

Several other targets also cased

19 killed – 372 wounded

Page 12: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

12

Terrorist Surveillance in the US

Al Qaeda surveillance operations:

Prudential Financial Center

NYSE, Citigroup Headquarters

IMF, and World Bank

More than 100 photos of the Prudential Center

Details of site security measures and ways to defeat them

Types of badges worn by employees

Dossiers on individual security guards

Page 13: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

13

Mumbai

Casing began at least 16 months prior to attack

Attack team had never been in the city

179 killed – 300+ wounded

Page 14: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

14

Unsuccessful (Terrorist)

Fort Dix (NJ) May 2007

Page 15: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

15

Daniel Patrick Boyd, Hysen Sherifi, Mohammad Omar Aly Hassan, Ziyad Yaghi, Zakariya Boyd, Dylan Boyd & Anes Subasic, arrested and charged with conducting surveillance on Quantico

Marine Base and planning to attack US military members

Unsuccessful (Terrorist)

Marine Corps Base Quantico (VA) July 2009

Page 16: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

16

PREVENTION vs. MITIGATION

Physical Security Improvements Are Not Sufficient

Our Focus Must Equally Be:

Page 17: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

17

Every successful terrorist assault

(and many criminal acts)

have been preceded by extensive

surveillance, reconnaissance, and logistics activity

We Know:

Attack Prevention

Page 18: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

18

WHO HAS THE WILLINGNESS AND CAPABILITY TO ATTACK US?

Page 19: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

19

Suspicious Activity?

Page 20: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

20

Suspicious Activity?

Page 21: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

21

MY Building

Page 22: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

22

Page 23: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

23

Red Shirt w/ sunglasses…

Page 24: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

24

Foreign national Army Major

Page 25: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

25

Attack

Cycle

Page 26: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

26

The Intelligence Gathering Process

Exploit This Vulnerability

Identify

Gather

Collate

Share

Analyze

To IdentifyPatterns of Behavior Indicative of Pre-Attack Surveillance

Terrorist’s Greatest Vulnerability

Suspicious Activity

Reports

Page 27: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

27

Understand Surveillance

Know The Terrorist Operational Planning Cycle

Identify Surveillance Vulnerabilities / Zones

Improve Observational Awareness Skills

Effectively Employ Technology

Methodology

Page 28: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

28

Basic Objectives of Surveillance

• Collect Intelligence

• Avoid Detection

Page 29: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

29

Identify facility vulnerabilities and surveillance targets

Identify locations from which surveillance can be undertaken

[RED ZONES]

Identify and describe electronic security measures

(number, location, type and coverage of cameras)

Document security procedures

Study security force

(size, gender, ethnicity, locations, dress, weapons ,competency)

Determine First Responder response times, locations

Specific Surveillance Objectives

Page 31: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

31

OBSERVATION POINTS

N

Main Access

Road

3

54

1 2

67

OP 1

OP4/7

OP 5

OP 6

OP 3

OP 4OP 2

Page 32: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

32

SURVEILLANCE VULNERABILITIES

N

Main Access

Road

3

54

1 2

67

OP 1

OP4/7

OP 5

OP 6

OP 3

OP 4OP 2

Page 33: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

33

0 – Compound1 – Church2 – Residence #13 – Residence #24 – Overpass

Page 34: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

35

Compound

Possible

Surveillance

Page 35: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

36

Compound

Possible

Surveillance

Page 36: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

37

Compound

Possible

Surveillance

Page 37: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

38

Basic Training

Improve Observational Awareness

Consider Surrounding Environments

Objectives

Techniques

Methodologies

Pay Careful Attention to Surveillance Zones

Understand Surveillance

Page 38: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

39

Counterintelligence Training

Counterintelligence fundamentals

FIS Operations and Methodology

Demeanor in a hostile real-world environment

Changing clothes in the field

Cover Legend (Cover for Status)

Elicitation/Counter-Elicitation

Foreign Nat’l and Cultural Awareness

Overview of modern day TSCM threats

Advanced covert camera & video usage

Elements & signatures of espionage tradecraft

Suicide Bomber/Behavioral Pattern Recognition (BPR) Training

Physiological and psychological signs associated with suicide bombers

Critical differences between combating terrorism and criminal acts

Design, construction, concealment and delivery of Type I, II, III improvised explosives devices (IED)

Legally defensible suicide bomber identification techniques

Case analysis related to studies on modern suicide bombing events

Instruction/perform physical techniques, interception tactics and other practical skills required to effectively counter suicide bombing tactics

Instruction/perform physical techniques and firearms skills associated with deadly-force and non-deadly force encounters (interceptions)

Instruction/perform decision making under stress, firearms/Simunition training specific to unconfirmed and confirmed suicide bomber encounters in proximity to queued individuals and unstructured crowds.

Stress Reflex Indicators (SRI)

Physiological/psychological manifestations associated with BPR/SRI

Articulation of behaviors/indicators and reasonable suspicion

Proactive application of BPR/SRI techniques to detect imminent suicide bombing attacks

Role and limitations of visual analysis

Facial analysis, expressions and micro-behaviors

Emotional speech analysis

Gesture analysis

General expressivity

Sensory parameter dependent physiological responses

Surveillance Detection Training

SD Operations Instruction & OJT

Types of surveillance

Identifying Hostile Surveillance Locations

“Reverse Engineering” what a Hostile Surveillant can see and its value

Window matrices

Surveillance Point diagrams

Neutralization and exploitation

Establishing baseline activity

Target Analysis

Surveillance indicators and anomalies

Observation and reporting skills

Surveillance Detection Routes

Surveillance Case studies

SD Team operations

Page 39: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

40

Multifaceted Functionality

• Detect Hostile Surveillance

• Detect Countersurveillance activities

• Support Counterintelligence Functions

• Support Executive Protection

• Provide Protective Intelligence

• Conduct Awareness Training

• Assist in Vulnerability Assessments

• Provide overwatch Special Unit activities

• Support to Incident Command

• Tactically Engage Extreme Threats

Page 40: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

41

Employ Technology

to

Exploit Terrorist Vulnerabilities

Page 41: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

42

Technology Should:

• Capture Events Quickly

Location, Time, Activity, Description, Image (no PII dependence)

• Establish Institutional Memory

• Structure Information to Facilitate Analysis

• Identify Patterns of Behavior Indicative of Pre-Attack Surveillance

• Provide Immediate Feedback on Suspicious Individuals, Vehicles, etc.

• Automate Threat Information Sharing Across Regions and Industries

• Enable Ad Hoc Queries Across the Data base

Collect, collate, and analyze suspicious activity reports to detect

patterns indicative of pre-attack surveillance

Page 42: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

43

“…premier Surveillance Detection Program in DoD.”

- 2010 Joint Services Vulnerability Assessment (JSIVA) Team

Best Practices

Page 43: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection

44

Questions?

Surveillance DetectionSemper Vigilans - Amo Haud Alius

Always Vigilant – Like No Other

Rik Kirchner

Surveillance Detection Division