Terrorism - sunshinepasaquian

advertisement
F/SUPT HERBERT B CEZAR
Director
Fire National Training Institute (FNTI)
It is the premeditated, threatened, actual use of
violence, force, or by any other means of destruction
perpetrated against person/s, property/ies, or the
environment.
It is committed by any person or group of
persons, whether natural or juridical, who, with
intent to create or sow danger, panic, fear or chaos
to the general public or a group of persons or
particular person, or to coerce or intimidate the
government to do or to abstain from doing an act.
Threatening or causing death or serious bodily harm (on
person or persons);
Threatening or causing serious risk to health or safely of (the
public or any segment of the public;
Threatening or causing substantial damage or wanton
destruction or resorting to arson on critical infrastructure or
property, public or private;
Threatening or causing serious interference with or serious
disruption of an essential service, facility or system, whether
public or private, other than a result of lawful advocacy,
protest, dissent or stoppage of work;
Hijacking or threatening to hijack any kind of aircraft, electric
or railroad train, locomotive, passenger bus or oilier means of
mass transportation, or public conveyance, or piracy of ship or
sea vessel;
Taking or threatening to kidnap or deprive any
person of his/her liberty;
Assassinating or threatening to assassinate, or
kidnapping or threatening to kidnap the President or
the Vice President of the Philippines, the President of
the Senate, the Speaker of the Mouse of
Representatives or the Chief Justice of the Supreme
Court;
Killing or violently attacking an internationally
protected person or depriving the liberty of such person
in violation of the Convention on the Protection and
Punishment of Crimes Against Internationally Protected
Persons, including Diplomatic Agents, and oilier
international agreements;
Attacking or threatening to attack the cyberspace, by
destroying the actual machinery of the information and
communication infrastructure, disrupting the information
technology underlying the internet, government or
private networks or systems, or committing any unlawful
act against networks, servers, computers or other
information and communication systems;
Wilfully destroying the natural resources in land, water
and air, such as
forests or marine and mineral
resources, or intentionally causing oil or toxic spillages,
or other similar acts of destruction against the
environment that threatens ecological security;
Unlawfully manufacturing, processing, selling, acquiring,
possessing, using, diverting, supplying or transporting
chemical, biological, radiological or nuclear agents, or
equipment and instruments used in their production,
distribution, release or spread that would endanger
directly or indirectly the safety of one or more individuals,
or to cause mass destruction or great damage to
property; or
Unlawfully manufacturing, selling, acquiring, supplying,
disposing, using or possessing explosives, bombs,
grenades, projectiles, devices or other lethal weapons, or
substances or machinery used or intended to be used for
the manufacture of explosives in furtherance of, or
incident to, or in connection with an act of terrorism
defined herein.
BALI BOMBING
October 2002
WORLD TRADE CENTER
September 2001
2005 Valentine’s Day Bombings
“Mini-9/11 in the Philippines”
Bus exploded into flames
at least 3 persons killed
Bomb detonated
at a bus terminal
1 person killed
Blast hit outside
Gaisano Mall
at least 3 persons killed
SUPERFERRY14 BOMBING
February 2004
“the WORLD's fourth deadliest
terrorist strike since September 11, 2001, and
ASIA's worst
since the Bali bombings of October 2002”.
-TIME MAGAZINE AUGUST 2004
LIST OF BOMBING ACTIVITIES
THAT TRANSPIRED IN 2006
July 11, 2006
Mumbai, India
eight coordinated explosions during the evening rush hour
190+ killed and hundreds injured.
July 10, 2006
Sao Paulo, Brazil
bomb Injures exploded inside a subway train
More than 10 injured
July 5, 2006
Yakhroma, Russia
bomb exploded at a Muslim prayer house
no casualties reported
June 26, 2006
Suicide Attack in Colombo, Sri Lanka
A top Sri Lankan general was killed along with several others
June 24, 2006
Bangkok, Thailand
two bombs exploded near the Thai Rak Thai (TRT) party headquarters
June 23, 2006
Sharif Aguak, Mindanao
bomb exploded near a public market
5+ people killed and 10 injured
June 20, 2006
an explosion that occurred on a Makati street
One injured
June 13, 2006
pillbox bomb exploded inside Camp Bagong Diwa
no reports of injuries
a SWAT van sustained damage
June 11, 2006
Lipa, Batangas
grenade inside a bag exploded outside of a market
at least nine people injured
June 11, 2006
Commonwealth Avenue, Quezon City
homemade bomb exploded near a parked bus
no reports of injuries; bus sustained significant damage
June 11, 2006
Plaza Lawton, Manila
explosion hit a police station
June 9, 2006
Pampanga
grenade attack on the residence of a PGMA supporter
June 6, 2006
Makati City
improvised explosive device detonated
outside the Great Pacific Life Bldg
no reports of injuries
March 29, 2006
Digos City, Davao del Sur
bomb exploded inside a bus
at least 17 people were injured
the bus and three nearby vehicles sustained damages
March 27, 2006
a bomb exploded in Jolo, Sulu
9 people killed, 20 others injured
February 20, 2006
an explosion occurred inside the gates of Malacañang, Manila
no reports of damage or injuries
February 18, 2006
Jolo, Sulu
a bomb exploded at a karaoke bar located several meters from
an army base where US soldiers are participating in joint
exercises with the AFP
1 person killed; 28 others injured
January 30, 2006
Ermita, Manila
a small improvised explosive device detonated in front of the
Court of Appeals Bldg
no reports of damage or injuries
Any inimical act and/or unwanted event,
which may bring about adverse results.
Types of Threats
Typhoon
NATURAL
Volcanic Eruption
Earthquake
Flood
Erosion
MANMADE
TERRORISM
Sabotage
Technical or Financial Fraud
Coup d’ Etat/Rebellion
Labor Strike
War
TECHNOLOGICAL
Plant Breakdown
Breakdown or Failure of
Protective Devices
Environmental Hazards
Subjects of Threats
Nation
Person
Organization
Infrastructures
Community
Key Assets
Operations
Areas of Threats
Transport Terminals
Business Facilities
Public Conveyances
Medical/Health Facilities
Telecom Facility
Emergency Service Facilities
Power Facilities
Road Infrastructures
Water Supply Facilities
Religious Institutions
Government Buildings
Educational Institutions
Movie Houses & Malls
Markets
A condition used to describe
the openness or weakness of a
subject of a threat.
The condition of vulnerability is directly
influenced by the strength or weaknesses
of a security or protective program.
The chance that a given threat
will occur and bring about
adverse consequences.
Importance of a subject of a threat as defined by its nature.
Importance is directed towards:
a. The subject of a threat itself
b. Community and citizenry
c. Any or all aspects of National Security
Tangible
and
intangible
outcome or consequence of a
threat occurrence, such as loss,
injury, disadvantage or gain.
The product of threat probability
and the sum of impact of a threat
occurrence that can be inflicted
against a target of an identified
threat.
The systematic and logical study of a
given threat, its likelihood of occurrence and
the severity of its impact, purposely for the
formulation and implementation of an
effective and efficient security program to
detect, control or prevent losses.
the probability that an undesirable
event or threat may actually take
place
and
inflict
adverse
consequences, including the failure
to achieve goals and objectives.
One is at RISK when:
there is a threat
the threat is probable to occur
consequences if threat occurs
4TH STEP
3RD STEP
2ND STEP
1ST STEP
The 1st Step of Risk Analysis
involves the identification
and profiling of a threat.
Who offers the
threat?
Why the threat?
THREAT
Objectives of the
source of threat?
Likely specific
targets?
Modus Operandi?
Helps in
designing an
effective and
efficient
security or
protective
program.
are specific conditions that
identify a threat. Also, they
directly or indirectly influence
the potential of a threat to exist
or be present.
Criticality or Nature of the Subject of Threat
Internal & External Environment
Historical Incidents/Events
Nature & Criticality of Facility
Operational Significance
Financial or Business Significance
Security Classification
Work or Input-Output
sensitive areas
processes
and
Critical infrastructures and key assets
(plus costs)
Financial Status and Financial Operations
Implications
to
national
economy, politics, etc.
security,
Environment
EXTERNAL
Politico-socio-economic
situations
Geography,
topography,
etc
Demography
Presence of PNP, AFP and
Emergency
Response
Agencies
and
their
capabilities
Presence of sources of
threats in the area
Global Situation
INTERNAL
Structural Design
Landscaping
Facility Occupants
Facility Contents
Security Personnel &
their capabilities
Presence of sources of
threats
inside
the
facility
Organization
Historical Event
Historical
Event
Internal
Incidents
Security Dept
External
Incidents
Government
Private
• Near-miss events
• Actual events
Other Depts
RATING
LEVEL
1 – 2 Very Low
3–4
Low
5–6
Medium
7–8
High
9 – 10
Very High
Example:
RATING
1. The facility provides electricity in entire Luzon.
-
7
2. The facility is located in an NPA-infested area.
-
9
3. The facility was attacked by NPA’s in 2003.
-
8
=
8
Average Threat Potential
The 2nd Step of Risk Analysis
involves the identification and
measurement of
the weaknesses
of
the
existing
security
or
.
protective program of a subject of
a threat, as against the strength
of the same security or protective
program.
Allows risk owners to know the strength of
their existing Security Program, what needs to
be corrected and what more are necessary to
be put in place in defense against an identified
threat.
Vulnerability
directly
influences
the
probability of a threat to actually take place.
WEAK SECURITY
STRONG SECURITY
Increases probability of threat occurrence
Reduces probability of threat occurrence
are specific security conditions
that weakens or strengthens
the security/protective program
of a target of threat.
absence of security or protective measures
inadequacy of security or protective measures
defective security or protective measures
to empirically estimate the vulnerability of a target of threat.
RATING
Example:
LEVEL
1–2
Very Low
3–4
Low
5–6
Medium
7–8
High
9 – 10
Very High
RATING
1. No security guards are employed.
-
7
2. Perimeter fence is below standard of 8 feet.
-
9
3. Personnel Control Policy is not strictly enforced.
-
8
Average Vulnerability
=
8
The 3rd Step of Risk Analysis
The probability that an
identified threat is going
to actually take place is
measured using empirical
parameters and tool.
specific conditions that
influence the probable
occurrence
of
an
identified threat.
Threat Factors (Threat Potential)
Vulnerability Factors
PROBABILITY
=
Average Rated
Threat Factors
X
Average Rated
Vulnerability Factors
100
EXAMPLE: Probability of Terrorist Attack to
occur
THREAT FACTORS
RATIN
VULNERABILITY
G
RATI
NG
1. Facility located in NPA
-
7
1. Facility does not have
-
9
2
.
-
8
2
.
-
7
=
8
area
Facility already
attacked once
AVERAGE =
7.5
fence
PROBABILITY
=
PROBABILITY
=
Facility does not have
guards
7.5
XAVERAGE
8.0
100
0.60 or 60%
PROBABILI
TY
LEVEL
0.00
Improbable
0.01 - 0.20
Very Low
0.21 - 0.40
Low
0.41 - 0.60
Moderate
0.61 - 0.80
High
0.81 - 1.00
Virtually
Certain
DESCRIPTION
Given no changes, threat
will not occur.
Least chance of
occurrence.
Occurrence is less likely.
There is 50:50 chance
of occurrence.
Occurrence is much
greater.
Given no changes, threat
will certainly occur.
The 4th Step of Risk Analysis
The possible impact of a
threat occurrence and
their
severity
are
identified and measured.
GENERAL IMPACT
Failure to achieve organizational goals &
objectives
Loss of lives
Destruction or loss of infrastructures &
key assets
Destruction,
disruption
or
loss
of
systems/operations
Income losses
Loss of information and competitive edge
Loss of image, goodwill and reputation
Adverse implications to all or any aspects
of National Security
OTHER IMPACTS THAT NEED
TO BE CONSIDERED
Geographic dispersion of potential damages
Temporal extension of potential damages
Requirements of restoring the situation to the
state before the damages occurred (i.e.,
reforestation and detoxification of water)
Violation of individual, social or cultural
interests and values generating social
conflicts and psychological reactions from
those who feel inflicted by the risk
consequences systems/operations
PUTTING VALUE TO IMPACT
Quantitative
Lives lost & Cost
Downtime period & cost
Lost income
Replacement Cost
Restoration Cost
Cost of property destroyed
Qualitative
Reputation
Goodwill
Patronage loss
Morale loss
Effects to others
IMPACT
SEVERITY
=
Average (Quantitative
+
Qualitative)
X
SAMPLE CASE
QUANTITATIVE
RATING
1.
Building destruction worth P10.0M -
5
2.
Income loss/day equal to P2.0M
-
4
3.
Death & injuries
-
5
QUALITATIVE
1.
Stoppage of services
-
5
2.
Loss of reputation/image
-
4
3.
Patronage loss
-
5
AVERAGE IMPACT/LOSS RATING =
4.70
PROBABILITY =
0.60
IMPACT
SEVERITY
=
(14
+
6
14)
X
0.60 = 3.0
Probability
RATI
NG
1
2
3
4
LEVEL
DESCRIPTION
Improbab
Effect is insignificant.
le
Can be covered by normal contingency
services.
Low
Short discontinuance of operation.
Noticeable impact on earnings.
Moderate
Requires attention of top management.
Very
Serious
Major impact on balance sheet
account.
Requires changes in investment policy.
Threat Potential
Rating
8.00
Threat
TERRORIST
ATTACK
Level: HIGH
Vulnerability
Rating
Threat Probability
Impact
0.60
4.70
Level: MODERATE
Level: FATAL
8.00
Level: HIGH
Impact Severity
3.00
Level: MODERATE
In a complex and rapidly
changing world, the day can
instantly turn from friendly
to hostile in a least expected
time and with serious
consequence …
…thus, constantly
“penetrating the fog of the
future”, and managing the
dangers beyond is a vital
priority for all of us!
F SR/SUPT HERBERT B CEZAR
Director
Fire National Training Institute (FNTI)
Download