Title: Protective Security Advisors
1Protective Security Advisors
- Securing the Nations critical infrastructures
one community at a time
2Communities Depend Daily on Reliable Systems
These systems are the invisible critical
infrastructure that our communities depend on
every day, for example
- Telephone systems that allow us to use
ATMs/credit cards for our financial transactions,
and real-time communications for business and
personal use (cellular phones, pagers, e-mail,
land-lines, and faxes) - Electricity that allows us to light and heat our
homes and businesses, and power computers and
vital communication devices like radio and
television - Water systems that provide us with water for
drinking, - sanitary needs, irrigation, and firefighting
capabilities
3Critical Infrastructure Key Resource Sectors
Critical Infrastructure Sectors
Key Resources
- Agriculture and food
- Banking and finance
- Chemical
- Defense industrial base
- Emergency services
- Energy
- Information technology
- Postal and shipping
- Public health and healthcare
- Telecommunications
- Transportation systems
- Drinking water and water treatment systems
- National monuments and icons
- Commercial facilities
- Dams
- Government facilities
- Nuclear reactors, materials, and waste
4The Threat
- We will hit hard the American economy at its
heart and its core. - - Osama bin Laden
Without doubt, terrorist groups recognize the
economic ramifications of attacks on the Nations
critical infrastructures and key resources.
5Dependency on our Critical Infrastructures Key
Resources
- National Security
- Economic Vitality
- Our Way of Life
- Disrupt government and private industry
operations and impact our economy and society - Result in large-scale human casualties, property
destruction, and damage to national prestige and
public confidence
6 Department of Homeland Security (DHS)
Mission
- Prevent terrorist attacks in the United States
- Reduce Americas vulnerability to terrorism
- Minimize the damage from potential attacks
- and natural disasters
7DHS Risk-Based Approach
- Risk management is fundamental to managing the
threat, while retaining our quality of life and
living in freedom. Risk management must guide our
decision-making as we examine how we can best
organize to prevent, respond and recover from an
attack. - The most effective way, I believe, to apply
this risk-based approach is by using the trio of
threat, vulnerability and consequence as a
general model for assessing risk and deciding on
the protective measures we undertake. - Secretary Michael Chertoff
- U.S.
Department of Homeland Security
8 A Focus on Risk
- How do we set our priorities? We cannot
protect every single person against every single
threat at every moment and in every place We
have to be able to focus ourselves on those
priorities which most demand our attention. We
have to focus on Risk Consequence
Vulnerability Threat. -
Secretary Chertoff, July 25, 2005
9 A Focus on Risk
- ... A terrorist attack on the two-lane bridge
down the street from my house is bad but has a
relatively low consequence compared to an attack
on the Golden Gate Bridge. At the other end of
the spectrum, even a remote threat to detonate a
nuclear bomb is a high-level priority because of
the catastrophic effect. Each threat must be
weighed, therefore, along with consequence and
vulnerabilities - Secretary Chertoff, March 16, 2005
10A Maturing Risk Management Process
As our knowledge, skills, and experience have
matured, our focus has evolved, as we have begun
targeting key areas for attention.
- National Infrastructure
- Protection Plan
- CI/KR within urban areas
- Additional Comprehensive Reviews
- Risk-based UASI grants
Region System
- Nuclear Comprehensive Review
- BZPP
- SAVs
- Chemical facility security regulatory framework
Sector
- Selected chemical sites
- Nuclear Power Plants
- Tall buildings
- Stadiums and Arenas
Asset
Year
2004
2005
2006 and beyond
Best professional judgment
Limited consequence analysis
Prioritization
Risk analysis
11Changing Real-World Risk
PeriodicNetAssessment
Potential Targetsin 56 States andTerritories
Apply ThreatAssessConsequence Prioritize
Identify andCharacterizeAssets
DetermineVulnerabilitiesand Protective Gaps
ImplementProtectiveMeasures
ReducedRiskfrom TerroristAttacks
Intelligence
SituationalAwareness
12FY 2006 Goals
- Goal 1 Identify and catalog critical
infrastructure and key resources (CI/KR) - Goal 2 Identify and assess vulnerabilities of
our nations CI/KR to terrorist attack, including
consequences of successful attack and
cross-sector interdependencies - Goal 3 Utilize a risk assessment framework,
based on vulnerability, consequence, and threat,
to prioritize assets and rationalize allocation
of limited protective resources - Goal 4 Enhance the protective security of the
nations CI/KR by facilitating better detection,
deterrence, and defense against potential
attacks - Goal 5 Build a more effective headquarters and
field organization focused on policy planning and
program management directed at NIPP
implementation and SSA responsibilities, with a
surge capability to respond to emerging threats
and operational needs.
13The Challenge to Protect Critical Infrastructures
Key Resources
- 85 of all critical infrastructures and key
resources are privately-owned - Homeland Security must work together with
industry and state, territorial, local, and
tribal governments to protect critical
infrastructures and key resources - To help communities better protect the Nations
assets, Homeland Security is placing specialized
Protective Security Advisors around the country
14PSA Districts
15Protective Security Advisors Sector Coverage
PSAs cover all 17 CI/KR sectors.
16Protective Security Advisors Initial Focus
- Although they cover all 17 CI/KR sectors,
Protective Security Advisors initial focus will
be primarily on two sectors
- Commercial facilities
- Dams
17Examples of Commercial Activities
State Capitol
Waterpark Capital Wisconsin Dells
University of Wisconsin
- 13 four-year campuses statewide
- 13 UW 2 year colleges statewide
- 153,000 students
- 83 major attractions
- 8,000 hotel rooms
- Located in Central Wisconsin with easy Interstate
access.
- Houses the Governor, Legislature, and the State
Supreme Court
State Fair West Allis
Summerfest Milwaukee
- The Worlds largest music festival, lasting 11
days - 2005 attendance was 901,841
- 2004 Fair Attendance 879,323
18Key Wisconsin Sport Venues
Lambeau Field
Miller Park
Camp Randall Stadium
Bradley Center
- Badgers Football seating capacity is nearly 80,000
- Milwaukee Bucks
- Seating capacity 20,000
- Seating capacity for Brewers games is 42,200
19Agriculture/Food Industry
- Agriculture/Food Industry is Wisconsins largest
industry - 2nd largest milk producing State, producing 22
billion pounds of milk in 2004
20Homeland Security Provides Community-Based Support
- Protective Security Advisors will
- Assist with ongoing local and state critical
infrastructure security efforts which are
coordinated by the state Homeland Security
Advisors - Support the development of the national risk
picture by identifying, assessing, monitoring,
and minimizing risk to critical assets at the
local or district level - Upon request, facilitate, and coordinate
vulnerability assessments for local critical
infrastructures and key resources
21Protective Security AdvisorsWill Also
- Provide reach-back capability to Homeland
Security and other Federal government resources - Assist in confirmation of critical asset
information for accurate inclusion into the
National Asset Database - Serve as advisors regarding local infrastructure
during activation of the National Response Plan - Provide local context and expertise to Homeland
Security to ensure that community resources are
used effectively
22How Can You Help?
- Engage with your Protective Security Advisors to
facilitate protective actions and establish
priorities and the need for information - Assist in efforts to identify, assess, and secure
critical infrastructures and key resources in
your community - Communicate local critical infrastructure
protection-related concerns - Business and economic ramifications of actions
- Issues unique to the community
23Summary
- When we have a free path, we go forward.
- If we meet an obstacle, we go around it.
- If the object cannot be overcome, we retreat.
- When the enemy is unprepared, we surprise him.
- If he is alert, we leave him alone.
- Baader-Meinhoff
- Former German urban terrorist organization