threat

Post on 20-Jan-2016

40 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

DOMESTIC. THREAT. PRODUCED BY MR. RICK CASTRO NGB-AT. INTRODUCTION. With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become as diverse as our mission. TERRORISTS. VANDALS. SABOTEURS. CRIMINALS. - PowerPoint PPT Presentation

TRANSCRIPT

With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become as diverse as our mission.

• The ARNG’s assets and diverse mission has exposed the organization to targeting of foreign and domestic terrorist intentions.

• The threat to the ARNG is significant and there are no affiliated persons immune from the risk of terrorist attack.

• Terrorist organizations continue to become tactically and technologically advanced, and possess the capability to strike anywhere in the world.

• Employed are as diverse as the organizations themselves.

• Certain groups remain intent on acquiring, developing, and employing Weapons of Mass Destruction (WMD).

Their ideologies range from:

- POLITICAL

- RELIGIOUS

- REVOLUTIONARY

- ENVIRONMENTAL

- SPECIAL INTEREST

- NARCO

• The ARNG is highly susceptible to criminals intent on gaining profit from the theft of state and government property.

• There are varying degrees of crime that pose a threat to the ARNG’s operational capabilities.

The following are the most significant threats...

• Professional criminals, with various degrees of training.

• Conduct surveillance, possibly infiltrate the ranks, and plan in detail.

• May possess advanced equipment for unlawful entry into facilities and secure areas.

• May be affiliated with terrorist organizations.

Targets include, but are not limited to:

- All caliber firearms

- Ammunition and explosives

- Pharmaceuticals (controlled substances)

- Military communications equipment

- Identification production equipment

- U.S. Government vehicle tags

- Specialized equipment (night vision, etc.)

• Person or group of persons with little or no training.

• May be affiliated with terrorist organizations.

• Conduct little or no surveillance and planning.

• May or may not possess advanced equipment. Typically destroy established security measures to gain access.

• Commit criminal acts for personal gain.

Target items that can be easily sold:

- Common caliber weapons (M9, M590, M4/16)

- Common caliber ammunition

- Tools

- Pharmaceuticals (controlled substances)

- Office equipment (computers, copiers, etc.)

The presence of gangs and gang members within the ARNG’s units, near installations and armories pose a significant threat to personnel and property.

• Gangs operate in a similar manner to organized criminals.

• May posses equipment comparable to organized criminals for unlawful entry.

• They act to amass weapons to counter their rivals and acquire items that can be sold to fund their activities.

Target items that can be sold:

- Common caliber weapons (M9, M590, M4/16)

- Common caliber ammunition and explosives

- Vehicles

- Pharmaceuticals (controlled substances)

- Specialized equipment (night vision, etc.)

- Office equipment (computers, copiers, etc.)

Pose a significant threat to the ARNG.

• Their actions whether foreign directed or domestically derived, can have a catastrophic impact on operational capability.

Saboteurs generally strike…

- Mission-critical personnel

- Manufacturing facilities

- Transportation hubs

- Communication nodes

- Ammunition, explosives, and fuel depots

Vandals are an imminent threat to ARNG assets.

• Incidents of vandalism are the most commonly reported.

• Vandalism can be costly, effect operations, and unit preparedness.

• Vandals range significantly in their ages and their reasons.

Their acts include but are not limited to:

- Breaking windows

- Slashing Tires

- Graffiti

The threat to ARNG automated information systems (AIS) is significant.

• Involve deliberate, overt, and clandestine acts to achieve desired results.

• Includes the theft or destruction of computer hardware and software.

• The information, not the systems that transports it, is the target.

• These unauthorized users constitute most cyber attacks.

• In most instances, the challenge in accessing government systems is the sole motivation.

• They primarily attack computer-based systems, but are not limited to attacks on AIS networks and mainframes.

• Individuals with legitimate access to AIS pose the most significant threat.

• Their motives range from personal conviction to monetary compensation.

• Whether recruited or self-motivated they are the hardest to defend against.

• Have embraced technology to accomplish their target selections, intelligence collection, and operational planning.

• Unauthorized access to AIS has increased the possibility of critical data being manipulated or destroyed.

• By gaining access to a computer network they can increase their probability of success.

• Operate overtly and clandestinely to gain access to, and steal, military information.

• Their collection efforts take place wherever possible to engage the targeted individual with minimum risk to the collector.

• The collector(s) can acquire information through a variety of mediums to include electronic and physical surveillance.

• Generally highly trained, and able extract information with cunning and persistence.

• Highly trained to recruit individuals from whom to illicit information to further their national or organizational objectives.

• This has been a general Domestic Threat Briefing created to instill awareness within ARNG personnel.

• Not all of the information presented will apply in all geographical locations.

• This information should be used as a reference to gauge your respective regional security posture.

top related