Introduction Regarding Terrorism - Lets Presume You are All Nice - - PDF document

introduction
SMART_READER_LITE
LIVE PREVIEW

Introduction Regarding Terrorism - Lets Presume You are All Nice - - PDF document

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 presented by Kevin D. Mellott president, ERASE Enterprises Introduction Regarding Terrorism - Lets Presume You are All Nice People if so, your perceptions


slide-1
SLIDE 1

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 1

presented by Kevin D. Mellott president, ERASE Enterprises

Introduction

Regarding Terrorism - Let’s Presume You are All Nice

People – if so, your perceptions and opinions do not count!

Director Comey, FBI stated that there are open

terrorism investigations in 49 out of 50 states

6 people in USA indicted 2/7/15 for “providing

material support and resources to terrorists”

Hundreds of arrests and interventions as well as those

plots that were carried out

Killing of Ambassador Christopher Stevens

slide-2
SLIDE 2

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 2

Terms and Definitions

Section 2656f(d) of Title 22 of the United States Code

defines certain key terms used in Section 2656(a) as follows:

(d)… (1) the term "international terrorism" means terrorism

involving citizens or the territory of more than one country;

(2) the term "terrorism" means premeditated, politically

motivated violence perpetrated against non-combatant targets by subnational groups or clandestine agents; and

(3) the term "terrorist group" means any group practicing,

  • r which has significant subgroups which practice,

international terrorism.

Terms and Definitions

Foreign Terrorist Organization (FTO)

  • 1. It must be a foreign organization.
  • 2. The organization must engage in terrorist activity, as

defined in section 212 (a)(3)(B) of the INA (8 U.S.C. § 1182(a)(3)(B)), or terrorism, as defined in section 140(d)(2) of the Foreign Relations Authorization Act, Fiscal Years 1988 and 1989 (22 U.S.C. § 2656f(d)(2)), or retain the capability and intent to engage in terrorist activity or terrorism.

  • 3. The organization’s terrorist activity or terrorism must

threaten the security of U.S. nationals or the national security (national defense, foreign relations, or the economic interests) of the United States.

slide-3
SLIDE 3

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 3

Foreign Terrorist Organizations (FTO)

53 total FTO’s as of January 2015

There were 37 FTOs in 2005 Prior to September 11, 2001 there were 29 FTOs

An additional 30 to 40 Terrorist Groups that do not

qualify as FTOs

Historically, some become FTOs others do not Increased success of FTOs spawn more groups

Methods, Motives, and Capabilities Differ

FTO / Terrorist Group Motives

Political change / government policy change Financial Ideology Creation of an ethnic state / new government Religious Cause Activists Genocide

slide-4
SLIDE 4

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 4

Essential Elements of an FTO

Terrorist Group Finance Communications Command

&

Control Unifying Vision Training

Recruitment

Targets

Directly related to motivation of group Attacking a Target must create value for FTO

Media Coverage Elimination of political foes and/or adversaries Damage to adversary resources Recruitment of funding and personnel Supports “Unifying Vision” of organization Creates panic/fear and a call to change policies

Not always about killing, but collateral death is

acceptable to many FTO’s and mandated by others

slide-5
SLIDE 5

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 5

Terrorism Myths & Misperceptions

Criminals and Terrorists are the same

Not even close! Criminals are Self Centered-Terrorists are not Often, the criminal’s family rejects them, the terrorist’s family and

friends may be very supportive

Criminals intend to stay alive, not get caught, escape justice, never

to be identified – Terrorists are typically committed to the cause and accept the risks of potential harm to themselves

The “Crimes” Code or Penal Code is restricted by jurisdiction and

terrorists are not Terrorists are created due to –

  • ppression

poverty desire for self recognition due to unjust actions against them

Terrorism Myths & Misperceptions

The Geneva Convention is Applicable

Must be a signer of the convention If out of uniform you must be “open armed” when taken into

custody (not fighting) Islamic Extremist Lone Wolves exist Respecting the Culture or Religion will pre-empt the

development of terrorists

Only if you submit to or meet their demands Only if you change your culture or religion

Government, politics, law, and religion are separate

elements of a culture / society

Terrorism is a world wide problem

It only impacts societies where a high value is placed on life

slide-6
SLIDE 6

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 6

The Islamic Extremist Threat

Unique Aspects

Long history Involves in fighting within the faith Killing of other believers of Islam Exponential growth in past ten years Global threat, not just regional Largest population of religion is not extremist, but those who

are commit continuous and deadly acts Ultimate Goals

World subjugation to Islam ISIL – recreation of the last Caliphate (just a starting point)

Methodologies-unlimited

FTO Distribution by Motive

33 FTO Islamic Extremists - 62% 6 FTO Israel- Palestine Conflict 11% 14 FTO Other Motives 27%

Chart Title

slide-7
SLIDE 7

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 7

Locations of FTO taken Hostages

Western Culture

Political Self (legal, economic, cultural, and social systems) Religious Self (beliefs, faith, and common community) Ethnic Self (cultural traditions, appearance, language)

slide-8
SLIDE 8

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 8

Islamic Religion/Culture/Politics

Political Self (legal, economic, cultural, and social systems) Religious Self (beliefs, faith, and common communit y Ethnic Self (cultural traditions, appearance, language)

Nation States by Religious Influence

Sunni Majority Control Shia Majority Controlled Saudi Arabia Iran Jordan Iraq Syria Bahrain Palestinian Territory Azerbaijan Kuwait Yemen (65% Sunni-Shia Militia Take Over) Qatar Lebanon (Shia 36% / Sunni 22%) Turkey UAE Morocco, Algeria, Tunisia, Libya, Egypt Sudan Afghanistan, Pakistan

slide-9
SLIDE 9

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 9

Islamic Terrorist Groups Sunni / Shia Influence

Sunni Influenced Shia Influenced Al-Qaida Hezbollah ISIL Asaib Ahl al-Haq Hamas Mahdi Army / Promise Day Brigade (Muqtada al Sadr, denounced violence in Feb 2014, stepped down from politics) Al-Aqsa Martyrs Brigade

Islamic State of Iraq and the Levant (ISIL)

Mastery of Technology Identification and Selection of Appropriate Channels to

Communicate their Message

The focus on “sectarian” Syria Selection of

Disenfranchised individuals seeking “belongingness”

(Maslow’s Hierarchy of Needs)

Individuals who either have no parental oversight or who have

family support for concept of jihad

Those who have achieved but still have no standing in the

culture / society that they live in Actions speak louder than words! Call to Jihad!

slide-10
SLIDE 10

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 10

ISIL Director of Social Media

CCA – Caliphate Cyber Army

Focused on raising funds for ISIL to replace lost

revenues from oil sales and destroyed cash depots

Primary target are private corporations that operate in

Caliphate areas (Turkey all the way to Egypt)

Business Email Compromise Ransomware Distributed Denial of Service (DDoS) Attacks Theft of valuable intellectual property

Fast technology turn arounds Defense / Military in nature

slide-11
SLIDE 11

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 11

Why is the Threat Escalating?

Advancements in Technology

Communications capabilities Audio and Video production capabilities Translation capabilities to cross language barriers Financial tools and systems

Advent of accessible & inexpensive travel Mastering of Social Media by ISIL

“What are You Waiting For Campaign” Professionally produced Videos of the Actions of the

“Varsity” Team – influx of donations and recruits

Things to Watch-Enemy of my Enemy

Fight Against ISIL

Russia Syria (sectarian) Iran (Shia) Hezbollah (Shia) Jordan (Sunni) Saudi Arabia (Sunni) Anonymous UAE (Sunni)

Turkey

slide-12
SLIDE 12

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 12

Countermeasures-Government

Attack the FTO Essential Elements

ISIL is headquartered in Ar-Raqqah, Syria We have photographs of their leaders Penalize all who purchase oil from ISIL Consider localized EMP strikes on C & C facilities

Get Dr. Shakil Afridi out of Pakistan Raise the reward values on HVTs Re-visit NSA domestic intercept program Engage the leaders of the Islamic Nation States

Countermeasures-Government

CyberAttack the ISIL Social Media Division

Anonymous hacked and shutdown Facebook, Twitter,

and other social media accounts belonging to ISIL recruiters

If we can identify the server in North Korea that

impacted Sony, we can find ISIL

The issue is the required political will power to deal with the

countries that house the servers

Remember, the UN is trying to take over the Internet

management function from the USA

Evaluate the liability of the ISPs and channels

slide-13
SLIDE 13

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 13

Countermeasures-Personal

Pay attention to global incidents Have a plan wherever you go

Get down Find Cover / Concealment Get out Avoid crowded areas at high threat times

Remember, they are not targeting you Attacks are typically short time frames Don’t follow the crowd

Do Not rely on Cellular Phone Services for Emergencies-

Satellite Only

Countermeasures-Personal

Develop protective strategies for each asset category

People Property Business Continuity Financial Resources

Develop protective strategies for each functional area

Communications Finance Transportation Logistics

Physical needs Support to other strategies and tactics (such as power support)

slide-14
SLIDE 14

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 14

Countermeasures-Personal

Harden you own target structures/vehicles! Control your itinerary Maintain your situational awareness Inspect your business facilities and ensure compliance

with high quality fire and security practices

Consider adjustable threat level protocols Technology considerations Policy, Training, and Human Behavior Actions

Realize that USDHS Warnings are REAL! Watch the alert levels of European countries Maintain a state of the art CyberSecurity program

Countermeasures-Personal

Have a USA re-entry emergency plan to get back in Develop code words for personal emergencies and when

under surveillance

Use portable door alarms on hotel rooms Always have a “go” bag ready for emergency evacuation

Flashlight Copy of passport Medications Communications Cash Notepad and pen / pencil Bottle of Water and Snack Bars

slide-15
SLIDE 15

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 15

Economic Impact

Oil is being leveraged as tool in the MENA region, massive

ramifications on US economy

Transportation targets are still high on the list, major impact on

US business environment

Major expansion into extortion, organized crime, other generic

criminal enterprises

The cost of security and the lack thereof can result in billions of

dollars lost-ask Mexico

Review your investments to see if they are at risk if a domestic

attack occurs

Always monitor international investments to be certain that

there are no entities on the Treasury watch list

Review your insurance policies for terrorism coverage

(where applicable)

Important Government Resources

USDOS – Overseas Security Advisory Council USDOJ – FBI – InfraGard

North Texas Chapter 16 Critical Infrastructure Sectors – pick wisely GETS communication program

USDHS Approved Fusion Centers

North Central Texas Fusion Center – McKinney, TX Various others throughout state and country Multi-discipline intelligence sharing center

US – CERT (Computer Emergency Readiness Team) FBI – Economic / Industrial Espionage Squad (per region)

slide-16
SLIDE 16

The Aerospace & Defense Forum Dallas-Ft. Worth Chapter April 14, 2016 16

Thank you!

Kevin Mellott

ERASE Enterprises 214-501-5175 kevin@erase.com