Title: CounterTerrorism Preparedness
1Counter-Terrorism Preparedness
Ensuring Business Continuity in an Uncertain
World
2Ensuring Business Continuity in an Uncertain
World
- What you need to know
- What you need to do
3Definition of Terrorism
Premeditated violent attack directed at civilian
and/or non-combatant targets for social,
political, or religious reasons. Terrorism
relies heavily on the element of surprise and its
effect is accentuated because it is unexpected.
4Terrorism An Evolving Phenomenon
- Terrorist strategies and tactics change and have
observable trends and patterns. - Because terrorism is premeditated, the trends and
patterns can be analyzed and specific threats can
be defined. - Understanding the threat can aid preparedness,
save lives, and enable operational continuity in
the event of a major terrorist event.
5The enemy has declared itself at war with our
civilization
6- "When a terrorist group wants to attack the U.S.,
they generally target business. Since 1968 when
the government first started tracking terrorism,
80 percent of the attacks on U.S. interests have
been on businesses. . . . This reflects a new
reality that is upon us that we all have to live
with." - L. Paul Bremer, Presidential Envoy to Iraq
formerly Chairman CEO, Crisis Consulting at
Marsh, Inc.
7Yet . . .
- Fewer than 35 of Fortune 500 companies have put
adequate systems in place to address the
terrorist threat. - Less than 50 have even assigned budgets for
counter-terrorism prepared programs.
8- The FBI says the chances of another major
terrorist attack in the US in the near future is - 100
9The consequence of complacency
- Immediate economic, productivity, and human
losses, market fluctuations, demand slow-downs,
legal liabilities - Continual drain in productivity, sales, and
investment stemming from the fear of the
unknown - Long term losses from the macro-economic effects
of a catastrophe
10Four Stages of Preparedness
- Threat Analysis
- Vulnerability Assessment
- Mitigation Planning And Implementation
- Systems Maintenance - Monitoring Testing
11Threat Analysis
Identifying Potential Threats
- Geography
- Type of Industry
- Company Profile
- Management Profile
- Nature of Customer Base
- Level of Market Need
- Political Issues
12The Threat
Individual Group Political Organizations Religious
Organizations
Knives / Guns Explosives Chemical Biological Nucle
ar Cyber
- Plant Go
- Bomb
- - Timed
- Remote
- Suicide
- Piracy/Hijacking
- Dispersion
- Natural Disasters
- Kidnapping
- Assassinations
Civilians Symbolic Structures CriticalSystems Haz
ardous Facilities Bridges, Tunnels, Dams, Harbors
Land vehicle Ship or boat Plane Train Mail Contain
er Package Gun Missle Network
13Current Terror Threat Trends
- Use of Internet for disinformation, doomsday
proclamations, and communications - Growing threat of marine-based operations
- Threat against trains, subways, and buses in
metropolitan areas - Alternative uses of aircraft to implement attacks
- Cooperation between diverse terrorist
organizations with continued isolation of
satellite units - Attacks on Arab and Islamic targets, in addition
to American and Israeli targets - Derivative attack plans based on western ideas
142. Assessing Vulnerability What are Your Needs
- Physical Vulnerability
- Facility
- Perimeter
- Equipment
- Inventory
- Personnel
- Process Vulnerability
- Communications, IT, and IP
- Supply and Distribution Chains
- Human Resources
15- The best anti-crime security is not sufficient
to protect your company against a terrorist
attack
16Assessing Your Vulnerability
Facility
- Approach getting close to your facility
- Access getting in to your facility
- Mobility getting around in your facility
- Intrusion getting into your critical systems
17Assessing Vulnerability
Process
- Communications and IT
- Supply Chain / Distribution Chain
- Hiring Practices
- Vendors
- Personnel-based processes
- Executive processes
- Redundancies
183. Mitigation Planning and Implementation
- Identification of systems needed to close
vulnerability gaps - Review of suppliers and vendor selection
- Installation
- Integration of individual components and testing
compatibilities
19A Word about Your Personnel
- No democratic government can defeat terrorism
without the active support of the people. Their
participation is essential to limiting the
damaging impact of terrorism. - (Israeli intelligence officer)
20Personnel Training
- Training your personnel how to react in multiple
emergency situations will help to - - protect lives, property, and critical systems
- - mitigate injury and financial loss
- create an empowered and competent in-house
first line of defense - Training can provide the extra margin of safety
needed to avoid or limit disaster and ensure
operational continuity.
21Another word about training
- Americans have a proud tradition of participating
in our countrys defense in times of war. - Armed with the basic training they need, your
personnel will rally to help in whatever ways
they can. They will stop being part of the
problem and become part of the solution.
224. Auditing and Monitoring
- Regular systems tests to assure good operational
status - Spot tests on individual systems in various
combinations - Audits as required to align systems with current
threat status - War Games, Scenario Building, Vulnerability
Report Card
23Your companys strong preparedness program can
- Eliminate or greatly reduce the threat of a
direct terrorist attack against your company. - Ensure maximum protection for your company
against the impact of a direct or indirect
terrorist attack that may otherwise disrupt or
destroy your operational continuity.
24- The next terrorist attack in the US is likely to
impact all of us significantly. - The time to prepare is now.
25Gerard Group International LLC
Ensuring Counter-Terrorism Preparedness
164 Westford StreetTyngsborough, MA
01879978-649-4575www.gerardgroup.com