SlideShare une entreprise Scribd logo
1  sur  32
Recognition, on a non
discriminatory basis, of
characteristics and behavioral
patterns of persons who are likely
to threaten security
Objective: at the end of the topic, the
trainee must have gain some
knowledge in identifying a possible
terrorist.
INTELLIGENCE BRIEF
Maj. Matt Hurley
11 WG/DSI
Question of the Week
• Which one is
the suicide
bomber?
Answer
• Sri Lankan
suicide bomber
“Dhanu,”
moments before
killing former
Indian PM Rajiv
Gandhi, herself,
and 17 others
Answer
• Bomb concealed
under her dress,
smuggled through
security at an
election rally
• Detonated the
bomb while
bending down to
touch Gandhi’s
feet
BOMBER TARGET SECURITY
The Threat Is Spreading
• During the 1980s:
 Lebanon
 Kuwait
 Sri Lanka
The Threat Is Spreading
• During the 1980s:
 Lebanon
 Kuwait
 Sri Lanka
• 1990-2002:
 Israel
 India
 Pakistan
 Yemen
 Algeria
 Chechnya
 Kenya
 Tanzania
 Panama
 Argentina
 Croatia
 Australia
 Turkey
 Saudi Arabia
 Afghanistan
Modus Operandi
• A suicide bomber’s success depends on three main
elements:
– Secrecy is essential to plan and conduct the mission
– Thorough reconnaissance and surveillance is required to
choose a target and identify its weakness
– Extensive rehearsals and “dry runs” are necessary to ensure
stealth and speed during the attack
• Ultimate goal: inflict as many casualties as possible
Prevention
• Traditional concepts of security are based on deterring
terrorist attacks
– Assumes the terrorist fears death or capture
– But, suicide attacks depend on the death of the terrorist
– The suicide bomber doesn’t care about his/her death,
imprisonment or torture at the time of the attack
– No need for an escape plan, traditionally the most difficult
part of a terrorist operation
• There is no sure method of preventing a determined
suicide bomber, but…
• The surveillance / reconnaissance phase is the best
time to spot and thwart attack planning
• Strong and obvious force protection measures are the
best way to deter a suicide attack
– The terrorist group wants to succeed
– The suicide bomber does not want to die for nothing
– If a target is too tough, they will choose another
Prevention
Prevention
• Be alert for indicators
– Surveillance, particularly
focusing on access points
– Dry runs to identify hazards
or security checkpoints
– Purchase of, or illicit access
to, facility blueprints HIZBALLAH SURVEILLANCE
OF NORTHERN ISRAELI
SETTLEMENTS
• Pamphlet distributed to the public, early Sep 02
• Lists basic external, behavioral indicators:
– Unseasonable dress or conspicuous, bulky clothes
– Obvious or awkward attempts to “blend in” to a
crowd
– Repeated and nervous handling of parts of clothing
– Profuse sweating, slow-paced walking while
focusing on sides
– Attempts to stay away from security personnel
– Hesitant, nervous muttering
– Perfumed, recently shaved
Prevention: Tips from the Israelis

Contenu connexe

En vedette

A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
Noel Tan
 
Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)
Yasir Dil
 

En vedette (20)

A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
 
Al qaeda
Al qaedaAl qaeda
Al qaeda
 
Physical security of premises
Physical security of premisesPhysical security of premises
Physical security of premises
 
I love my town
I love my townI love my town
I love my town
 
It technology used by terrorist
It technology used by terroristIt technology used by terrorist
It technology used by terrorist
 
Coding for Terrorism in ICD-10-CM
Coding for Terrorism in ICD-10-CMCoding for Terrorism in ICD-10-CM
Coding for Terrorism in ICD-10-CM
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed doc
 
Ppt ..terrorism
Ppt ..terrorismPpt ..terrorism
Ppt ..terrorism
 
4D bim construction scheduling on the 1885 St. James pl. project
4D bim construction scheduling on the 1885 St. James pl. project4D bim construction scheduling on the 1885 St. James pl. project
4D bim construction scheduling on the 1885 St. James pl. project
 
Terrorism and pakistan
Terrorism and pakistanTerrorism and pakistan
Terrorism and pakistan
 
terrorism in Pakistan
terrorism in Pakistanterrorism in Pakistan
terrorism in Pakistan
 
Terrorism in Pakistan
Terrorism in PakistanTerrorism in Pakistan
Terrorism in Pakistan
 
On Board Security Risk Management
On Board Security Risk ManagementOn Board Security Risk Management
On Board Security Risk Management
 
ISPS: Security Awareness Training / Designated Security Duty
ISPS: Security Awareness Training / Designated Security DutyISPS: Security Awareness Training / Designated Security Duty
ISPS: Security Awareness Training / Designated Security Duty
 
terrorism in pakistan
terrorism in pakistanterrorism in pakistan
terrorism in pakistan
 
Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)
 
Terrorism-what,why,where,how
Terrorism-what,why,where,howTerrorism-what,why,where,how
Terrorism-what,why,where,how
 
Presentation OnTerrorism
Presentation OnTerrorismPresentation OnTerrorism
Presentation OnTerrorism
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 

Similaire à E. recognition, on a non discriminatory basis,

Crime Prevention and Basic Security for Civil Disturbances in the Community &...
Crime Prevention and Basic Security for Civil Disturbances in the Community &...Crime Prevention and Basic Security for Civil Disturbances in the Community &...
Crime Prevention and Basic Security for Civil Disturbances in the Community &...
Mary Lyn Enguerra
 
Behavior based cqb short
Behavior based cqb shortBehavior based cqb short
Behavior based cqb short
Trevor Thrasher
 
Surviving an active shooter 2
Surviving an active shooter 2Surviving an active shooter 2
Surviving an active shooter 2
Donielle Haynes
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
mojo_5
 

Similaire à E. recognition, on a non discriminatory basis, (20)

06_ROBBERY (edited).pptx
06_ROBBERY (edited).pptx06_ROBBERY (edited).pptx
06_ROBBERY (edited).pptx
 
Active Shooter
Active ShooterActive Shooter
Active Shooter
 
Active Shooter Booklet
Active Shooter BookletActive Shooter Booklet
Active Shooter Booklet
 
Active Shooter / Workplace Violence by CMRRC
Active Shooter / Workplace Violence by CMRRCActive Shooter / Workplace Violence by CMRRC
Active Shooter / Workplace Violence by CMRRC
 
Guidance for Handling an Active Shooter Event
Guidance for Handling an Active Shooter EventGuidance for Handling an Active Shooter Event
Guidance for Handling an Active Shooter Event
 
Crime Prevention and Basic Security for Civil Disturbances in the Community &...
Crime Prevention and Basic Security for Civil Disturbances in the Community &...Crime Prevention and Basic Security for Civil Disturbances in the Community &...
Crime Prevention and Basic Security for Civil Disturbances in the Community &...
 
Sir bryan nstp 2
Sir bryan nstp 2Sir bryan nstp 2
Sir bryan nstp 2
 
BSides Huntsville Keynote - Active Cyber Defense Cycle
BSides Huntsville Keynote - Active Cyber Defense CycleBSides Huntsville Keynote - Active Cyber Defense Cycle
BSides Huntsville Keynote - Active Cyber Defense Cycle
 
Defence of Thesis on Suicide Terrorism: Threat And Response
Defence of Thesis on Suicide Terrorism: Threat And ResponseDefence of Thesis on Suicide Terrorism: Threat And Response
Defence of Thesis on Suicide Terrorism: Threat And Response
 
Active shooter booklet
Active shooter bookletActive shooter booklet
Active shooter booklet
 
Behavior based cqb short
Behavior based cqb shortBehavior based cqb short
Behavior based cqb short
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
 
Surviving an active shooter 2
Surviving an active shooter 2Surviving an active shooter 2
Surviving an active shooter 2
 
Ppith[1]
Ppith[1]Ppith[1]
Ppith[1]
 
Use of Force Continuum
Use of Force ContinuumUse of Force Continuum
Use of Force Continuum
 
Defence Of Thesis Script
Defence Of Thesis ScriptDefence Of Thesis Script
Defence Of Thesis Script
 
2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf
2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf
2023 Compliatric Webinar Series - Active Shooter Training and Exercises.pdf
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
 
Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2Threat Assessment And Security Measures For Risk Management 2
Threat Assessment And Security Measures For Risk Management 2
 
Tips on mugging,extortion and kidnapping
Tips on mugging,extortion and kidnappingTips on mugging,extortion and kidnapping
Tips on mugging,extortion and kidnapping
 

Plus de Noel Tan (20)

Dcfis school development plan
Dcfis school development planDcfis school development plan
Dcfis school development plan
 
Module12.ppst5.4.2
Module12.ppst5.4.2Module12.ppst5.4.2
Module12.ppst5.4.2
 
Module11.ppst5.2.2
Module11.ppst5.2.2Module11.ppst5.2.2
Module11.ppst5.2.2
 
Module10.ppst5.1.2
Module10.ppst5.1.2Module10.ppst5.1.2
Module10.ppst5.1.2
 
Module9.ppst4.5.2
Module9.ppst4.5.2Module9.ppst4.5.2
Module9.ppst4.5.2
 
Module8.ppst4.4.2
Module8.ppst4.4.2Module8.ppst4.4.2
Module8.ppst4.4.2
 
Module7.ppst4.1.2
Module7.ppst4.1.2Module7.ppst4.1.2
Module7.ppst4.1.2
 
Module6.ppst3.1.2
Module6.ppst3.1.2Module6.ppst3.1.2
Module6.ppst3.1.2
 
Module5.ppst2.6.2
Module5.ppst2.6.2Module5.ppst2.6.2
Module5.ppst2.6.2
 
Module4.ppst2.3.2
Module4.ppst2.3.2Module4.ppst2.3.2
Module4.ppst2.3.2
 
Module3.ppst1.5.2
Module3.ppst1.5.2Module3.ppst1.5.2
Module3.ppst1.5.2
 
Module2.ppst1.4.2
Module2.ppst1.4.2Module2.ppst1.4.2
Module2.ppst1.4.2
 
Module1.ppst1.1.2
Module1.ppst1.1.2Module1.ppst1.1.2
Module1.ppst1.1.2
 
Ppst rpms manual
Ppst rpms manualPpst rpms manual
Ppst rpms manual
 
3. hazmat labeling presentation
3. hazmat labeling presentation3. hazmat labeling presentation
3. hazmat labeling presentation
 
4. hazmat placarding presentation
4. hazmat placarding presentation4. hazmat placarding presentation
4. hazmat placarding presentation
 
5. hazmat packaging presentation
5. hazmat packaging presentation5. hazmat packaging presentation
5. hazmat packaging presentation
 
6d. module6d carrier requirement_water
6d. module6d carrier requirement_water6d. module6d carrier requirement_water
6d. module6d carrier requirement_water
 
Anti ship piracy training
Anti ship piracy trainingAnti ship piracy training
Anti ship piracy training
 
B. security levels
B. security levelsB. security levels
B. security levels
 

E. recognition, on a non discriminatory basis,

  • 1. Recognition, on a non discriminatory basis, of characteristics and behavioral patterns of persons who are likely to threaten security
  • 2. Objective: at the end of the topic, the trainee must have gain some knowledge in identifying a possible terrorist.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. INTELLIGENCE BRIEF Maj. Matt Hurley 11 WG/DSI
  • 23. Question of the Week • Which one is the suicide bomber?
  • 24. Answer • Sri Lankan suicide bomber “Dhanu,” moments before killing former Indian PM Rajiv Gandhi, herself, and 17 others
  • 25. Answer • Bomb concealed under her dress, smuggled through security at an election rally • Detonated the bomb while bending down to touch Gandhi’s feet BOMBER TARGET SECURITY
  • 26. The Threat Is Spreading • During the 1980s:  Lebanon  Kuwait  Sri Lanka
  • 27. The Threat Is Spreading • During the 1980s:  Lebanon  Kuwait  Sri Lanka • 1990-2002:  Israel  India  Pakistan  Yemen  Algeria  Chechnya  Kenya  Tanzania  Panama  Argentina  Croatia  Australia  Turkey  Saudi Arabia  Afghanistan
  • 28. Modus Operandi • A suicide bomber’s success depends on three main elements: – Secrecy is essential to plan and conduct the mission – Thorough reconnaissance and surveillance is required to choose a target and identify its weakness – Extensive rehearsals and “dry runs” are necessary to ensure stealth and speed during the attack • Ultimate goal: inflict as many casualties as possible
  • 29. Prevention • Traditional concepts of security are based on deterring terrorist attacks – Assumes the terrorist fears death or capture – But, suicide attacks depend on the death of the terrorist – The suicide bomber doesn’t care about his/her death, imprisonment or torture at the time of the attack – No need for an escape plan, traditionally the most difficult part of a terrorist operation
  • 30. • There is no sure method of preventing a determined suicide bomber, but… • The surveillance / reconnaissance phase is the best time to spot and thwart attack planning • Strong and obvious force protection measures are the best way to deter a suicide attack – The terrorist group wants to succeed – The suicide bomber does not want to die for nothing – If a target is too tough, they will choose another Prevention
  • 31. Prevention • Be alert for indicators – Surveillance, particularly focusing on access points – Dry runs to identify hazards or security checkpoints – Purchase of, or illicit access to, facility blueprints HIZBALLAH SURVEILLANCE OF NORTHERN ISRAELI SETTLEMENTS
  • 32. • Pamphlet distributed to the public, early Sep 02 • Lists basic external, behavioral indicators: – Unseasonable dress or conspicuous, bulky clothes – Obvious or awkward attempts to “blend in” to a crowd – Repeated and nervous handling of parts of clothing – Profuse sweating, slow-paced walking while focusing on sides – Attempts to stay away from security personnel – Hesitant, nervous muttering – Perfumed, recently shaved Prevention: Tips from the Israelis