PDA

View Full Version : Understanding The National Threat Assessment



thedrifter
12-02-04, 06:39 AM
Big Events, Big Crowds, Big Targets
Understanding The National Threat Assessment
During the Republican Convention in New York City the US Secret Service worked closely with public law enforcement and private security to create the safest environment in the United States.


December 1, 2004


--------------------------------------------------------------------------------
by Jim Kouri

--------------------------------------------------------------------------------

When an event is designated a National Special Security Event, the Secret Service assumes its mandated role as the lead agency for the design and implementation of the operational security plan. This occurred during the Republican National Convention in New York City and the Democrat National Convention in Boston.

The Secret Service has developed a core strategy: the concept of forming partnerships with law enforcement and other security and public safety officials.

The goal of the cooperating federal, state and local agencies is to provide a safe and secure environment for protectees, other dignitaries, the event participants, and the general public.

Although law enforcement cannot discuss the methods and means utilized to carry out protective responsibilities, there is a tremendous amount of advanced planning and coordination in the areas of venue and motorcade route security, communications, credentialing, and training.

Certainly, they emphasize the importance of prevention and deterrence when developing an operational security plan, but agents and officers are also prepared to respond tactically to a threat if the situation dictates. As a result, the Secret Service will employ a number of specialized units during the course of this event.

The skills utilized by agents and officers to carry out their protective responsibilities are perishable. As a result, security personnel train on a continuing basis so that each individual remains prepared to respond to any eventuality. Their responses must be immediate, well coordinated, and effective. A variety of training initiatives are conducted to include simulated attacks and medical emergencies, inter-agency tabletop exercises, and field exercises.

The Secret Service National Threat Assessment Center (NTAC) was created to provide leadership and guidance to the emerging field of threat assessment. Specifically, NTAC will offer timely, realistic, useful, and effective advice to law enforcement and other professionals and organizations with responsibilities to investigate and/or prevent targeted violence.

Building on a recent operational study of U.S. assassins, attackers, and near-lethal approachers of public officials, NTAC will develop and provide threat assessment training and conduct operational research relevant to public official, workplace, stalking/domestic, and school-based violence. In addition, NTAC will offer its assistance to organizations interested in developing threat assessment programs.

Insider Threat Study
In collaboration with CERT/CC of Carnegie Mellon University, the Secret Service is developing the Critical Systems Protection Initiative (CSPI). The goal of this program is to develop a refined cyber security prevention and response capability in support of both investigative and protective missions. One important component of the CSPI is the Insider Threat Study, which will analyze the physical and online behavior of insiders prior to and during network compromises. The insider who already has access to systems can potentially be the most dangerous. The U.S. Secret Service foresees the applicability of this program in assisting private industry to evaluate and manage a potential problem before it happens.

As part of the Insider Threat Study, the U.S. Secret Service and CERT/CC are conducting an anonymous survey of critical infrastructure sector organizations. The purpose of the survey is to collect information about the current prevalence of insider cases across all critical infrastructure sectors.

During a special event, Secret Service and local law enforcement personnel form a network of support for members of the detail surrounding the protectees. The Secret Service command post acts as the communication center for protective activities, monitors emergencies, and keeps all participants in contact with one another. After a visit, agents analyze every step of the protective operation, record unusual incidents, and suggest improvements for the future.

Protective research is an integral component of all security operations. Agents and specialists assigned to protective research evaluate information received from law enforcement and intelligence agencies, as well as a variety of other sources regarding individuals or groups who may pose a threat to Secret Service protectees. They review questionable letters and emails received at the White House and maintain a 24-hour operation to receive, coordinate and disseminate protection-related information.


Sources: US Department of Justice, National Security Institute, National Association of Chiefs of Police
Jim Kouri

Ellie