National Security

 

 

https://sm.asisonline.org/Pages/Britain-To-Remain-at-‘Critical’-Threat-Level-Over-Weekend.aspxBritain To Remain at ‘Critical’ Threat Level Over WeekendGP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-05-26T04:00:00Zhttps://adminsm.asisonline.org/pages/megan-gates.aspx, Megan Gates<p>​Britain will remain at its highest terror alert level—critical—throughout the holiday weekend, authorities said. This means that another attack "is expected imminently."</p><p>The threat level remains at critical because of concerns about copycat attacks and attacks by a possible network that may have aided Manchester Arena bomber Salman Abedi, the <a href="http://www.bbc.com/news/uk-40056102" target="_blank">BBC News reports.</a></p><p>Detectives confirmed that they had "got hold of a large part of the network" and made "immense" progress arresting people suspected of aiding Abedi, <em></em><a href="https://www.theguardian.com/uk-news/2017/may/26/manchester-attack-police-arrest-man-and-search-barber-shop-moss-side-st-helens" target="_blank"><em>The Guardian</em> reports.</a></p><p>"Clearly, we haven't covered all the territory we want to but we have covered a large part of it so our confidence has been increasing in recent days," said Britain's top counter-terrorism officer, Mark Rowley. "But there's still more to do."</p><p>As of Friday afternoon, authorities had arrested eight men in connection to the Manchester Arena bombing. Their names have not been released to the public. </p><p>Detectives are also focusing on how the bomb used in the attack was made.<br></p><p>"Investigators believe aspects of the way the bomb was built point towards the maker having made improvised explosive devices before," according to <em>The Guardian.</em> "It showed considerable power and the nuts and bolts had been packed to maximize their murderous effect."</p><p>Immediately after the bombing, authorities were attempting to determine if Abedi had made the device himself or if someone else made it for him. </p><p>New information, reported by media outlets including <em><a href="https://www.nytimes.com/2017/05/26/world/europe/manchester-attack-uk-bomber.html?rref=collection/sectioncollection/europe" target="_blank">The New York Times,</a></em> revealed that Abedi "opened a bank account about a year ago, drew money from it to buy nails and screws from two hardware stores, and rented an apartment where he built the explosive device" he eventually detonated at the arena.</p><p>U.S. Representative and Chair of the House Homeland Security Committee Michael McCaul (R-TX) also confirmed that Abedi's backpack—which he used to carry the bomb in—contained triacetone triperoxide, the same explosive used in the London 2005, Paris 2015, and Brussels 2016 attacks.</p><p>While the threat level remains at critical, Britain is preparing to hold 1,300 events across the country this weekend for a bank holiday. Police have reviewed security procedures and increased patrols in areas where more boots on the ground are needed, <em>The Guardian</em> reports.​</p><p>"Extra armed police will patrol the FA Cup final at Wembley, where armored vehicles will be deployed, and the rugby premiership final at Twickenham," <em>The Guardian</em> said. "Fifty percent more firearms officers have been deployed on the streets, including some who were seen patrolling on Scarborough beach on Friday."</p>

 

 

https://sm.asisonline.org/Pages/How-Smugglers-and-High-Risk-Travelers-Enter-the-US.aspx2017-05-04T04:00:00ZHow Smugglers and High Risk Travelers Enter the United States
https://sm.asisonline.org/Pages/Detention-Tension.aspx2017-03-01T05:00:00ZDetention Tension
https://sm.asisonline.org/Pages/Cross-Border-Disorder.aspx2016-12-01T05:00:00ZCross-Border Disorder

 

 

https://sm.asisonline.org/Pages/Minor-Migrants.aspx2017-05-01T04:00:00ZMinor Migrants
https://sm.asisonline.org/Pages/Book-Review---Disasters-and-Public-Health.aspx2017-04-10T04:00:00ZBook Review: Disasters and Public Health
https://sm.asisonline.org/Pages/A-Picture-of-U.S.-Crime-.aspx2017-03-01T05:00:00ZA Picture of U.S. Crime

 

 

https://sm.asisonline.org/Pages/Trump’s-Cybersecurity-Executive-Order-Well-Received-by-Experts.aspx2017-05-12T04:00:00ZTrump’s Cybersecurity Executive Order Well Received by Experts
https://sm.asisonline.org/Pages/Solar-Technology-Can-Help-Secure-Military-Grids,-New-Paper-Finds.aspx2017-05-08T04:00:00ZSolar Technology Can Help Secure Military Grids, New Paper Finds
https://sm.asisonline.org/Pages/DHS-Warns-Congress-Of-Security-Threats-to-Government-Mobile-Devices.aspx2017-05-05T04:00:00ZDHS Warns Congress Of Security Threats to Government Mobile Devices

 

 

https://sm.asisonline.org/Pages/Britain-To-Remain-at-‘Critical’-Threat-Level-Over-Weekend.aspx2017-05-26T04:00:00ZBritain To Remain at ‘Critical’ Threat Level Over Weekend
https://sm.asisonline.org/Pages/Soft-Targets---What-Security-Professionals-Can-Learn-From-the-Manchester-Attack.aspx2017-05-24T04:00:00ZSoft Targets: What Security Professionals Can Learn From the Manchester Attack
https://sm.asisonline.org/Pages/Terror-Attack-Strikes-Manchester-Arena—What-We-Know.aspx2017-05-23T04:00:00ZTerror Attack Strikes Manchester Arena: What We Know

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Q-and-A---Soft-Targets.aspxQ&A: Soft Targets<p>​<span style="line-height:1.5em;">Jennifer Hesterman, Colonel, U.S. Air Force (Retired), discusses her book <em>Soft Target Hardening</em>, which was named the 2015 ASIS Security Book of the Year. Available from ASIS; asisonline.org; Item #2239; 322 pages; $69 (members); $76 (nonmembers).</span><span style="line-height:1.5em;">​</span></p><p><strong><em>Q.</em></strong><em> Why are soft targets increasingly attractive to terrorists?  </em></p><p><strong>A. </strong>Soft target, civilian-centric places that are not typically fortified—such as schools, churches, hospitals, malls, hotels, restaurants, and recreational venues—have little money to spend on security. Frequently, they must balance security, aesthetics, and a positive experience for customers.  </p><p>Terrorists select soft targets because there are many, possibly hundreds, of them in small towns and cities; they are vulnerable, so the odds of success are high and the terror effect is amplified among civilians. The story also stays in the news longer—the soft target attack in San Bernardino received far more coverage for almost twice the length of time compared to the Ft. Hood shooting. Military and government workers are generally seen as more legitimate targets than civilians, so soft targets provide more of the outrage, shock, and fear that terrorists crave.</p><p><em><strong>Q.</strong> What inspired you to write a book on hardening soft targets? </em></p><p><strong>A.</strong> I was living in the Middle East and close to several soft target attacks. I also realized that in the United States after 9-11, we further reinforced hard targets like government buildings and military installations, while soft targets are increasingly in the crosshairs but unprotected. I traveled all over the Middle East and Southwest Asia, and saw how soft targets are protected against attack. I wanted to apply some of these lessons to the civilian sector.  </p><p><em><strong>Q.</strong> Which soft targets are being hardened in the United States?</em></p><p><strong>A.</strong> Schools are further along the spectrum due to the rise of school shootings and stabbings. Mall security is much improved after the Westgate Mall attack in Nairobi, but shopping venues are still extremely vulnerable. Churches have a unique problem due to their open, inviting culture even after the Charleston shooting. Of course synagogues, mosques, and Sikh temples are moving towards a more hardened posture as the result of a rise in domestic terrorist activity. Hospitals usually don’t realize they are targets for terrorist attack or exploitation. Every type of soft target is different and requires tailored hardening tactics. </p><p><em><strong>Q. </strong>What trends should security professionals look out for?</em></p><p><strong>A. </strong>The insider threat is a growing concern. Insider attacks have the greatest possibility of success in terms of destruction of a target and mass casualties. The perpetrator can preposition items, understands the layout of the facility, has unfiltered access, and knows vulnerabilities to exploit. </p><p>We spend a great deal of time in vetting people during the hiring process, but new employees are basically left alone after the onboarding process. Venues like stadiums or concert halls may perform inadequate background checks on seasonal workers. The book discusses added layers of protection such as using behavioral detection techniques, a buddy system where a seasoned worker is paired with a new worker, and rules ensuring that no one is ever alone.</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Book-Review---Security-Culture.aspxBook Review: Security Culture<p>​Routledge; Routledge.com; 232 pages; $119.95.</p><p>Building and maintaining a strong security culture is integral to any organization’s security and resiliency. <em>In Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation</em>, author Hilary Walton demonstrates how to establish a “culture within a culture” where security is everyone’s priority and part of their day-to-day professional life. </p><p> This is a book about assessing, implementing, and improving upon a security and risk management culture within an organization. The author successfully outlines the fundamentals of a comprehensive, pragmatic security culture campaign, citing her experience as an organizational psychologist and business consultant in the United Kingdom and Australasia. Six case studies of her suggestions in action add credibility, and three appendixes offer useful examples of proposal letters and a year-long security communications plan.</p><p> Though many of her suggestions focus on large enterprises, her recommendations are scalable for smaller ones. While most of the book focuses on cybersecurity issues, an experienced security manager will see applications for integrating the entire security operation, as well. </p><p> This book is appropriate for a wide range of practitioners, instructors, and consultants who want to establish and build upon a strong security culture within their organizations. </p><p>--<br></p><p><em><strong>Reviewer: Erik Antons CPP, PSP</strong>, is manager of international security and executive services for Sempra Energy and is a former special agent with the Diplomatic Security Service, U.S. Department of State. He is a member of the ASIS International Global Terrorism, Political Instability and International Crime Council and a board member for the ASIS San Diego Chapter.       </em></p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Terrorism-Trends.aspxTerrorism Trends<p>​<span style="line-height:1.5em;">On June 9, the U.S. Department of Homeland Security’s (DHS) newly-created Countering Violent Extremism Subcommittee of the Homeland Security Advisory Council quietly released a report detailing the spread of violent extremist ideology in the United States and urging DHS to take significant action. Two days later, 29-year-old Omar Mateen, a U.S. citizen, walked into a nightclub in Orlando and killed 49 people, committing the nation’s worst terrorist attack since 9/11. During the hours-long attack on the nightclub, Mateen called police and pledged allegiance to ISIS, and subsequent investigations revealed he was self-radicalized. The horrific massacre on the night of June 11 reminded government leaders around the world that the real threat often comes from within the country’s borders. Within two days of its publication, the 38-page subcommittee report became exponentially more relevant.</span></p><p>The spread of violent extremism has been more palpable in Europe and the Middle East, where dozens of recent headline-grabbing attacks have occurred from Britain to Turkey. Shiite Muslims were targeted across the world by ISIS during the holy month of Ramadan: 45 people were killed in a suicide bombing at Istanbul’s main airport, a hostage situation in Dhaka resulted in the deaths of 23, and a truck bomb killed at least 250 people in Baghdad. France and Belgium are still reeling from separate coordinated soft target attacks that killed hundreds over the past year. </p><p>Not all extremist attacks are ISIS-inspired, either. A domestic terrorist who supported a far-right political party stabbed and killed Britain’s Labour MP Jo Cox in June.</p><p>An inquiry was released in July by a French parliamentary committee calling for more coordinated counterterrorism efforts, much like the DHS subcommittee report. The inquiry, which examined terrorist attacks in France last year, made 40 proposals to strengthen national security agencies. The nonpartisan committee encouraged the government to create a new national agency similar to the National Counterterrorism Center in the United States. Both European and American national security leaders are focusing on information sharing and addressing radicalization at its source.</p><p>“We are very concerned about violent extremists, lone offenders, and copycats, given how we understand that [ISIS] uses its propaganda, how it recruits, how it trains,” says Scott Breor, director of DHS’s Protective Security Coordination Division. “At the end of the day, while we may not have operatives per se here in the United States, we do know that [ISIS] is using the Internet and social media to recruit and train people who may have grievances against Western interests. They help them understand how to make devices that could be used in these attacks, and have been clear that they don’t need to travel overseas to be part of the [ISIS] machine, that the battlefield can be here in the United States.”</p><p>The subcommittee report does not shy away from detailing the significant, immediate threat violent extremism has on the United States, nor from calling on government officials, the technology and philanthropic sectors, and individual Americans to “conquer the challenge of violent extremism.” The subcommittee makes it clear that violent extremism is not just a problem for DHS.</p><p>“DHS itself is not equipped to counter violent extremism,” the report notes. DHS is significantly under-resourced to address online and offline radicalization and recruitment, and beyond recommending a budget increase of up to $100 million, the subcommittee emphasizes leveraging private sector support—and finances. The current budget “is insufficient to effectively counter the spread of violent extremist ideology in the United States, and does not in itself offer the chance to level—much less gain advantage against—increasingly aggressive efforts to recruit and radicalize our youth by violent extremist organizations,” according to the report.</p><p>The subcommittee is looking to the private sector for more than just money. Private sector talent and expertise should be used to create targeted online content to combat “a constant feed of reinforcing ideologies that are spread both on and offline.” The U.S. government must also work to extend counterterrorism efforts to the state and local levels, which have more direct impact on at-risk communities, the report notes. DHS leaders agree.</p><p>“Building bridges to the Muslim communities in this country and encouraging and helping American Muslim leaders to amplify the counter message to the Islamic state’s message and support these communities” is key to outreach at the local level, DHS Secretary Jeh Johnson tells Security Management. “I see it as a three-step mission: building bridges, counter message, and supporting these communities directly. I’ve been to a lot of them across the country. Everyone is different, but they are receptive to the message, and they’re almost always extraordinarily patriotic, too.”</p><p>Both Breor and DHS Assistant Secretary for Infrastructure Protection Caitlin Durkovich point to DHS’s Office for Bombing Prevention (OBP) as a way to empower local communities in preparing for a potential attack. The OBP enhances the nation’s ability to prepare for and respond to the use of explosives against critical infrastructure and local communities alike. The program’s resources and training are constantly evolving to stay a step ahead of terror trends, Durkovich tells Security Management. </p><p>“I think our adversaries are growing increasingly sophisticated and getting increasingly smarter in regards to how we do security,” Durkovich says. “I do think they have realized it’s a lot harder to attack a military installation or government building, and even some of these large public gatherings, because security is pretty robust. I think they have made a calculation that it is easier to target the smaller public gathering places and whether that is a crowded street of restaurants, a concert hall, or where people are gathering to get through security, you don’t have as much security in place. I think it is safe to say that these smaller and medium sized venues that don’t have in-depth security are becoming the targets because, candidly, it’s just easier to carry out an attack.”</p><p>One of the most important roles of the OBP is to bring together multiple jurisdictions in a community to raise awareness about the latest threats, Durkovich explains. “We talk about how they can plan both around special events and large gatherings to reduce the vulnerabilities of improvised explosive devices (IED), but equally important, if there is some sort of explosion or detonation, what the capabilities of each jurisdiction are, how they would respond, and who has the lead.” OBP training programs conducted around the country have already paid dividends, she says.</p><p>Breor notes that one of the most difficult—and important—aspects of the OBP is staying abreast of the latest bombing trends. “If you’ve ever picked up one of those books on how to do home improvements, how detailed they are with respect to pictures and the language they use, that’s the type of documentation that we see in these magazines that are out there in social media,” he says. “It is a great concern.” </p><p>Also of concern is the age of those most targeted by violent extremist efforts. The subcommittee report notes that millennials are by far the most susceptible to recruitment. “Our nation’s youth are at risk of online radicalization and recruitment like never before. They are by far the largest demographic being targeted by extremists, especially online. It is therefore our duty to protect them.”</p><p>ISIS supporters use approximately 46,000 Twitter accounts worldwide, and last year the Internet contributed to the radicalization of 83 percent of aspirants who attempted to travel to Iraq or Syria. On top of that, approximately half of successful travelers maintained an active presence on social media to encourage others to travel, document experiences, and share tips for evading law enforcement detection, the report notes.</p><p>Reaching millennials through constructive, positive, and identity-building approaches will encourage belonging with their American community, the subcommittee found. An emphasis on alternative narratives, from both the government and community influencers, is needed to reach millennials. “The private, non-governmental sector—including the full range of civil society across all communities, working hand-in-hand with leaders in science, faith, and technology—and with the full endorse-ment of our elected leaders at all levels offers the best chance to counter the threat of violent extremism for future generations,” the report states.</p><p>Another group targeted by ISIS and other extremist organizations is women of all ages. Professor and author Mia Bloom tells Security Management that ISIS targets Western and Arab women in two different ways: they give Western women the idea that they will have a very active, front-line role in ISIS, and tell Arab women that they will still be subservient, but will have more rights.</p><p>“Both of the underlying themes are about empowerment, but highly constrained empowerment, versus this false notion that they’re going to be some sort of superfighter,” Bloom says. ISIS also targets women based on their age and status—young women and students are recruited with positive messages of altruism, while older women with questionable pasts are offered a chance at reinvention. </p><p>ISIS is also using women to recruit other women because recruiters need to be able to relate to potential fighters, Bloom explains. “If you’re a 14-year-old girl, you’ve probably been warned to be careful of some dude on the Internet, but you may not have been warned about the cool 19-year-old Scottish girl.”</p><p>Women are rarely used on the front lines or as suicide bombers, Bloom notes: “If there’s a woman suicide bomber, it’s a one-off. It’s an exception to the rule,” she says. The primary contribution of women tends to be giving birth to fighters and raising them in a revolutionary environment. “Women in many ways are just like a commodity for ISIS, and although they are selling this message of empowerment, it’s actually the opposite,” Bloom explains.</p><p>Despite this, there has been a rise in non-Syrian or Iraqi women joining ISIS: the percentage of female extremists has risen from 10 percent a few years ago to 15 or even 20 percent today. And Bloom says that based on historical patterns, that number will continue to rise.</p><p>“They’re losing territory, they’re losing recruits, the men aren’t joining nearly as much, and they’re executing their own people who are leaving. That’s not a sign of strength,” Bloom explains. “When women join, it allows ISIS to goad men, it’s basically saying, ‘You aren’t especially manly because you’re letting women do your job.’”</p><p>It is possible that the role of women in ISIS would shift towards a more active one due to evolving tactics. “Women tend to be used in particular circumstances when groups shift from hard targets to soft targets and civilians,” Bloom explains. “When instead of trying to attack a tank, you’re going after a mosque of Shia parishioners, that’s where a woman comes into play. There are so many assumptions about the inherent peacefulness of a woman, and it’s popular to put an IED around a woman’s midsection and it looks like a late-term pregnancy.”</p><p>The subcommittee findings have been submitted to the DHS Homeland Security Advisory Council, and, if approved, will be sent to DHS Secretary Johnson for acceptance. In the meantime, agencies like the OBP are working to empower communities to prepare for and respond to attacks, and DHS leaders continue to encourage the public to embrace the See Something, Say Something mantra. “It’s not just a slogan, it’s really a shared responsibility in today’s environment,” Breor says.  </p>GP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465