surveillance detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · identify...
TRANSCRIPT
![Page 2: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/2.jpg)
FOUO
FOUO
Mr. Richard kirchner, jR.
chief, surveillance detection
Antiterrorism force protection directorate
Pentagon Force Protection Agency
u.s. Department of defense
20 September 2011
![Page 3: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/3.jpg)
3
Proactively identify criminal & terrorist operations
•Reduce the amount of people deployed in security
•Reduce the potential for terrorist or criminal activity
•Reduce operational deficiencies by focusing on threat vs. risk
•Enhance the capabilities of your security technology
•Enhance the security image of the organization
Would you like to…
Exploiting the Terrorist’s Greatest Vulnerability
![Page 4: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/4.jpg)
4
Perimeter Security / Target Hardening
Access Control
Incident Response
Background
Historical Security Focus
DHS Has Invested $30B+
Physical Security
First Responders
Impact
Improved Damage Mitigation Profile
More Efficient Response
![Page 5: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/5.jpg)
5
Results of Focusing on Physical Security
![Page 6: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/6.jpg)
6
![Page 7: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/7.jpg)
7
![Page 8: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/8.jpg)
8
![Page 9: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/9.jpg)
9
![Page 10: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/10.jpg)
10
Khobar Towers Tanzania
Mumbai
![Page 11: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/11.jpg)
11
Khobar Towers
Casing began 18-21 months before the attack
3-person team – 40 occasions
Vehicle sighted on ten separate occasions
Several other targets also cased
19 killed – 372 wounded
![Page 12: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/12.jpg)
12
Terrorist Surveillance in the US
Al Qaeda surveillance operations:
Prudential Financial Center
NYSE, Citigroup Headquarters
IMF, and World Bank
More than 100 photos of the Prudential Center
Details of site security measures and ways to defeat them
Types of badges worn by employees
Dossiers on individual security guards
![Page 13: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/13.jpg)
13
Mumbai
Casing began at least 16 months prior to attack
Attack team had never been in the city
179 killed – 300+ wounded
![Page 14: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/14.jpg)
14
Unsuccessful (Terrorist)
Fort Dix (NJ) May 2007
![Page 15: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/15.jpg)
15
Daniel Patrick Boyd, Hysen Sherifi, Mohammad Omar Aly Hassan, Ziyad Yaghi, Zakariya Boyd, Dylan Boyd & Anes Subasic, arrested and charged with conducting surveillance on Quantico
Marine Base and planning to attack US military members
Unsuccessful (Terrorist)
Marine Corps Base Quantico (VA) July 2009
![Page 16: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/16.jpg)
16
PREVENTION vs. MITIGATION
Physical Security Improvements Are Not Sufficient
Our Focus Must Equally Be:
![Page 17: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/17.jpg)
17
Every successful terrorist assault
(and many criminal acts)
have been preceded by extensive
surveillance, reconnaissance, and logistics activity
We Know:
Attack Prevention
![Page 18: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/18.jpg)
18
WHO HAS THE WILLINGNESS AND CAPABILITY TO ATTACK US?
![Page 19: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/19.jpg)
19
Suspicious Activity?
![Page 20: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/20.jpg)
20
Suspicious Activity?
![Page 21: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/21.jpg)
21
MY Building
![Page 22: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/22.jpg)
22
![Page 23: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/23.jpg)
23
Red Shirt w/ sunglasses…
![Page 24: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/24.jpg)
24
Foreign national Army Major
![Page 25: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/25.jpg)
25
Attack
Cycle
![Page 26: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/26.jpg)
26
The Intelligence Gathering Process
Exploit This Vulnerability
Identify
Gather
Collate
Share
Analyze
To IdentifyPatterns of Behavior Indicative of Pre-Attack Surveillance
Terrorist’s Greatest Vulnerability
Suspicious Activity
Reports
![Page 27: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/27.jpg)
27
Understand Surveillance
Know The Terrorist Operational Planning Cycle
Identify Surveillance Vulnerabilities / Zones
Improve Observational Awareness Skills
Effectively Employ Technology
Methodology
![Page 28: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/28.jpg)
28
Basic Objectives of Surveillance
• Collect Intelligence
• Avoid Detection
![Page 29: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/29.jpg)
29
Identify facility vulnerabilities and surveillance targets
Identify locations from which surveillance can be undertaken
[RED ZONES]
Identify and describe electronic security measures
(number, location, type and coverage of cameras)
Document security procedures
Study security force
(size, gender, ethnicity, locations, dress, weapons ,competency)
Determine First Responder response times, locations
Specific Surveillance Objectives
![Page 30: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/30.jpg)
30
POTENTIAL VEHICLE OBSERVATION POINTS
(FIXED, FOOT & VEHICULAR)
Cafe Taxi
Stand
Deli Parking
12
3
4
5
78
9
11
12
1415
10 6
13N
Building
Signage
Parking
![Page 31: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/31.jpg)
31
OBSERVATION POINTS
N
Main Access
Road
3
54
1 2
67
OP 1
OP4/7
OP 5
OP 6
OP 3
OP 4OP 2
![Page 32: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/32.jpg)
32
SURVEILLANCE VULNERABILITIES
N
Main Access
Road
3
54
1 2
67
OP 1
OP4/7
OP 5
OP 6
OP 3
OP 4OP 2
![Page 33: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/33.jpg)
33
0 – Compound1 – Church2 – Residence #13 – Residence #24 – Overpass
![Page 34: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/34.jpg)
35
Compound
Possible
Surveillance
![Page 35: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/35.jpg)
36
Compound
Possible
Surveillance
![Page 36: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/36.jpg)
37
Compound
Possible
Surveillance
![Page 37: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/37.jpg)
38
Basic Training
Improve Observational Awareness
Consider Surrounding Environments
Objectives
Techniques
Methodologies
Pay Careful Attention to Surveillance Zones
Understand Surveillance
![Page 38: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/38.jpg)
39
Counterintelligence Training
Counterintelligence fundamentals
FIS Operations and Methodology
Demeanor in a hostile real-world environment
Changing clothes in the field
Cover Legend (Cover for Status)
Elicitation/Counter-Elicitation
Foreign Nat’l and Cultural Awareness
Overview of modern day TSCM threats
Advanced covert camera & video usage
Elements & signatures of espionage tradecraft
Suicide Bomber/Behavioral Pattern Recognition (BPR) Training
Physiological and psychological signs associated with suicide bombers
Critical differences between combating terrorism and criminal acts
Design, construction, concealment and delivery of Type I, II, III improvised explosives devices (IED)
Legally defensible suicide bomber identification techniques
Case analysis related to studies on modern suicide bombing events
Instruction/perform physical techniques, interception tactics and other practical skills required to effectively counter suicide bombing tactics
Instruction/perform physical techniques and firearms skills associated with deadly-force and non-deadly force encounters (interceptions)
Instruction/perform decision making under stress, firearms/Simunition training specific to unconfirmed and confirmed suicide bomber encounters in proximity to queued individuals and unstructured crowds.
Stress Reflex Indicators (SRI)
Physiological/psychological manifestations associated with BPR/SRI
Articulation of behaviors/indicators and reasonable suspicion
Proactive application of BPR/SRI techniques to detect imminent suicide bombing attacks
Role and limitations of visual analysis
Facial analysis, expressions and micro-behaviors
Emotional speech analysis
Gesture analysis
General expressivity
Sensory parameter dependent physiological responses
Surveillance Detection Training
SD Operations Instruction & OJT
Types of surveillance
Identifying Hostile Surveillance Locations
“Reverse Engineering” what a Hostile Surveillant can see and its value
Window matrices
Surveillance Point diagrams
Neutralization and exploitation
Establishing baseline activity
Target Analysis
Surveillance indicators and anomalies
Observation and reporting skills
Surveillance Detection Routes
Surveillance Case studies
SD Team operations
![Page 39: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/39.jpg)
40
Multifaceted Functionality
• Detect Hostile Surveillance
• Detect Countersurveillance activities
• Support Counterintelligence Functions
• Support Executive Protection
• Provide Protective Intelligence
• Conduct Awareness Training
• Assist in Vulnerability Assessments
• Provide overwatch Special Unit activities
• Support to Incident Command
• Tactically Engage Extreme Threats
![Page 40: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/40.jpg)
41
Employ Technology
to
Exploit Terrorist Vulnerabilities
![Page 41: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/41.jpg)
42
Technology Should:
• Capture Events Quickly
Location, Time, Activity, Description, Image (no PII dependence)
• Establish Institutional Memory
• Structure Information to Facilitate Analysis
• Identify Patterns of Behavior Indicative of Pre-Attack Surveillance
• Provide Immediate Feedback on Suspicious Individuals, Vehicles, etc.
• Automate Threat Information Sharing Across Regions and Industries
• Enable Ad Hoc Queries Across the Data base
Collect, collate, and analyze suspicious activity reports to detect
patterns indicative of pre-attack surveillance
![Page 42: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/42.jpg)
43
“…premier Surveillance Detection Program in DoD.”
- 2010 Joint Services Vulnerability Assessment (JSIVA) Team
Best Practices
![Page 43: Surveillance Detection - az9194.vo.msecnd.netaz9194.vo.msecnd.net/pdfs/110902/3204.pdf · Identify and describe electronic security measures ... Basic Training ... Surveillance Detection](https://reader036.vdocument.in/reader036/viewer/2022081421/5af9e5f27f8b9a32348cfa8e/html5/thumbnails/43.jpg)
44
Questions?
Surveillance DetectionSemper Vigilans - Amo Haud Alius
Always Vigilant – Like No Other
Rik Kirchner
Surveillance Detection Division